Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-19060 (GCVE-0-2019-19060)
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T02:09:39.600Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", }, { name: "USN-4208-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4208-1/", }, { name: "USN-4210-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4210-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { name: "openSUSE-SU-2019:2675", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html", }, { name: "USN-4226-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4226-1/", }, { name: "USN-4364-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4364-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-05-21T02:06:08", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", }, { name: "USN-4208-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4208-1/", }, { name: "USN-4210-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4210-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { name: "openSUSE-SU-2019:2675", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html", }, { name: "USN-4226-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4226-1/", }, { name: "USN-4364-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4364-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-19060", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9", refsource: "MISC", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9", }, { name: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", refsource: "MISC", url: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", }, { name: "USN-4208-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4208-1/", }, { name: "USN-4210-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4210-1/", }, { name: "https://security.netapp.com/advisory/ntap-20191205-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { name: "openSUSE-SU-2019:2675", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html", }, { name: "USN-4226-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4226-1/", }, { name: "USN-4364-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4364-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-19060", datePublished: "2019-11-18T05:24:01", dateReserved: "2019-11-18T00:00:00", dateUpdated: "2024-08-05T02:09:39.600Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.8\", \"versionEndExcluding\": \"4.4.262\", \"matchCriteriaId\": \"A1229D50-3DAA-4031-97C9-8FF008A36A5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.5\", \"versionEndExcluding\": \"4.9.262\", \"matchCriteriaId\": \"D3BB1DB0-B588-4D26-89CB-F67E73EDA007\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.10\", \"versionEndExcluding\": \"4.14.226\", \"matchCriteriaId\": \"33EEBE13-936B-4210-9B09-9D61A6BE9A35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.15\", \"versionEndExcluding\": \"4.19.82\", \"matchCriteriaId\": \"2083AEA2-E04A-4A55-996D-5BB40D30417A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.20\", \"versionEndExcluding\": \"5.3.9\", \"matchCriteriaId\": \"BC19B2E4-2B1F-44F3-9944-91396EAC744D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\", \"matchCriteriaId\": \"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C0ADE5D-F91D-4E0D-B6C5-3511B19665F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EF46487-B64A-454E-AECC-D74B83170ACD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AFF1109-26F3-43A5-A4CB-0F169FDBC0DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AF71C49-ADEF-4EE2-802C-6159ADD51355\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3BC6E59-2134-4A28-AAD2-77C8AE236BCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24377899-5389-4BDC-AC82-0E4186F4DE53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23FE83DE-AE7C-4313-88E3-886110C31302\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"490B327B-AC20-419B-BB76-8AB6971304BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DCE2754-7A9E-4B3B-91D1-DCF90C1BABE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CA74E8B-51E2-4A7C-8A98-0583D31134A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B64AB37-A1D9-4163-A51B-4C780361F1F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BE9C9D7-9CED-4184-A190-1024A6FB8C82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"B73D4C3C-A511-4E14-B19F-91F561ACB1B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C47D72C-9B6B-4E52-AF0E-56AD58E4A930\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"039C3790-5AA2-4895-AEAE-CC84A71DB907\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4592238-D1F2-43D6-9BAB-2F63ECF9C965\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BA78068-80E9-4E49-9056-88EAB7E3682C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"092F366C-E8B0-4BE5-B106-0B7A73B08D34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7992E92-B159-4810-B895-01A9B944058A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BDD7AAB-2BF3-4E8C-BEE2-5217E2926C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:fas\\\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66EEA3CA-8CC7-4F0B-8204-6132D4114873\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE7C6010-F736-4BDA-9E3B-C4370BBFA149\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:solidfire\\\\,_enterprise_sds_\\\\&_hci_storage_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAA3919C-B2B1-4CB5-BA76-7A079AAFFC52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:solidfire_\\\\&_hci_management_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6D700C5-F67F-4FFB-BE69-D524592A3D2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2748912-FC54-47F6-8C0C-B96784765B8E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F921BC85-568E-4B69-A3CD-CF75C76672F1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD7447BC-F315-4298-A822-549942FC118B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB9B8171-F6CA-427D-81E0-6536D3BBFA8D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"090AA6F4-4404-4E26-82AB-C3A22636F276\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\", \"matchCriteriaId\": \"815D70A8-47D3-459C-A32C-9FEACA0659D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\", \"matchCriteriaId\": \"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A31C8344-3E02-4EB8-8BD8-4C84B7959624\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.\"}, {\"lang\": \"es\", \"value\": \"Una p\\u00e9rdida de memoria en la funci\\u00f3n adis_update_scan_mode_burst() en el archivo drivers/iio/imu/adis_buffer.c en el kernel de Linux versiones anteriores a la versi\\u00f3n 5.3.9, permite a atacantes causar una denegaci\\u00f3n de servicio (consumo de memoria), tambi\\u00e9n se conoce como CID-9c0530e898f3.\"}]", id: "CVE-2019-19060", lastModified: "2024-11-21T04:34:06.110", metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2019-11-18T06:15:12.343", references: "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20191205-0001/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4208-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4210-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4226-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4364-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20191205-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4208-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4210-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4226-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4364-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-401\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2019-19060\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-11-18T06:15:12.343\",\"lastModified\":\"2024-11-21T04:34:06.110\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.\"},{\"lang\":\"es\",\"value\":\"Una pérdida de memoria en la función adis_update_scan_mode_burst() en el archivo drivers/iio/imu/adis_buffer.c en el kernel de Linux versiones anteriores a la versión 5.3.9, permite a atacantes causar una denegación de servicio (consumo de memoria), también se conoce como CID-9c0530e898f3.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.8\",\"versionEndExcluding\":\"4.4.262\",\"matchCriteriaId\":\"A1229D50-3DAA-4031-97C9-8FF008A36A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.9.262\",\"matchCriteriaId\":\"D3BB1DB0-B588-4D26-89CB-F67E73EDA007\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.226\",\"matchCriteriaId\":\"33EEBE13-936B-4210-9B09-9D61A6BE9A35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.82\",\"matchCriteriaId\":\"2083AEA2-E04A-4A55-996D-5BB40D30417A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.3.9\",\"matchCriteriaId\":\"BC19B2E4-2B1F-44F3-9944-91396EAC744D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C0ADE5D-F91D-4E0D-B6C5-3511B19665F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF46487-B64A-454E-AECC-D74B83170ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AFF1109-26F3-43A5-A4CB-0F169FDBC0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF71C49-ADEF-4EE2-802C-6159ADD51355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3BC6E59-2134-4A28-AAD2-77C8AE236BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24377899-5389-4BDC-AC82-0E4186F4DE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FE83DE-AE7C-4313-88E3-886110C31302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"490B327B-AC20-419B-BB76-8AB6971304BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DCE2754-7A9E-4B3B-91D1-DCF90C1BABE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CA74E8B-51E2-4A7C-8A98-0583D31134A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B64AB37-A1D9-4163-A51B-4C780361F1F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BE9C9D7-9CED-4184-A190-1024A6FB8C82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B73D4C3C-A511-4E14-B19F-91F561ACB1B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C47D72C-9B6B-4E52-AF0E-56AD58E4A930\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"039C3790-5AA2-4895-AEAE-CC84A71DB907\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4592238-D1F2-43D6-9BAB-2F63ECF9C965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BA78068-80E9-4E49-9056-88EAB7E3682C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"092F366C-E8B0-4BE5-B106-0B7A73B08D34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7992E92-B159-4810-B895-01A9B944058A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDD7AAB-2BF3-4E8C-BEE2-5217E2926C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:fas\\\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66EEA3CA-8CC7-4F0B-8204-6132D4114873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7C6010-F736-4BDA-9E3B-C4370BBFA149\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire\\\\,_enterprise_sds_\\\\&_hci_storage_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA3919C-B2B1-4CB5-BA76-7A079AAFFC52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire_\\\\&_hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D700C5-F67F-4FFB-BE69-D524592A3D2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2748912-FC54-47F6-8C0C-B96784765B8E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F921BC85-568E-4B69-A3CD-CF75C76672F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9B8171-F6CA-427D-81E0-6536D3BBFA8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"090AA6F4-4404-4E26-82AB-C3A22636F276\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A31C8344-3E02-4EB8-8BD8-4C84B7959624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20191205-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4208-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4210-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4226-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4364-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20191205-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4208-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4210-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4226-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4364-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
suse-su-2019:3200-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-19081: Fixed a memory leak in the nfp_flower_spawn_vnic_reprs() could\n have allowed attackers to cause a denial of service (bsc#1157045).\n- CVE-2019-19080: Fixed four memory leaks in the nfp_flower_spawn_phy_reprs() could\n have allowed attackers to cause a denial of service (bsc#1157044).\n- CVE-2019-19052: Fixed a memory leak in the gs_can_open() which could have led \n to denial of service (bsc#1157324).\n- CVE-2019-19067: Fixed multiple memory leaks in acp_hw_init (bsc#1157180).\n- CVE-2019-19060: Fixed a memory leak in the adis_update_scan_mode() which could have \n led to denial of service (bsc#1157178).\n- CVE-2019-19049: Fixed a memory leak in unittest_data_add (bsc#1157173).\n- CVE-2019-19075: Fixed a memory leak in the ca8210_probe() which could have led to \n denial of service by triggering ca8210_get_platform_data() failures (bsc#1157162).\n- CVE-2019-19058: Fixed a memory leak in the alloc_sgtable() which could have led to \n denial of service by triggering alloc_page() failures (bsc#1157145).\n- CVE-2019-19074: Fixed a memory leak in the ath9k_wmi_cmd() function which could have led to\n denial of service (bsc#1157143).\n- CVE-2019-19073: Fixed multiple memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c which \n could have led to denial of service by triggering wait_for_completion_timeout() failures (bsc#1157070).\n- CVE-2019-19083: Fixed multiple memory leaks in *clock_source_create() functions which could have led \n to denial of service (bsc#1157049).\n- CVE-2019-19082: Fixed multiple memory leaks in *create_resource_pool() which could have led to \n denial of service (bsc#1157046).\n- CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() which might\n have led denial of service (bsc#1149448).\n- CVE-2019-0154: Fixed an improper access control in subsystem for Intel (R)\n processor graphics whichs may have allowed an authenticated user to potentially\n enable denial of service via local access (bsc#1135966).\n- CVE-2019-0155: Fixed an improper access control in subsystem for Intel (R)\n processor graphics whichs may have allowed an authenticated user to potentially\n enable escalation of privilege via local access (bsc#1135967).\n- CVE-2019-16231: Fixed a NULL pointer dereference due to lack of checking the\n alloc_workqueue return value (bsc#1150466).\n- CVE-2019-18805: Fixed an integer overflow in tcp_ack_update_rtt() leading to\n a denial of service or possibly unspecified other impact (bsc#1156187).\n- CVE-2019-17055: Enforced CAP_NET_RAW in the AF_ISDN network module to restrict\n unprivileged users to create a raw socket (bsc#1152782).\n- CVE-2019-16995: Fixed a memory leak in hsr_dev_finalize() which may have caused\n denial of service (bsc#1152685).\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903)\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's kvm\n hypervisor. An unprivileged host user or process with access to '/dev/kvm'\n device could use this flaw to crash the host kernel, resulting in a denial of\n service or potentially escalating privileges on the system (bnc#1151350).\n- CVE-2017-18595: A double free in allocate_trace_buffer was fixed\n (bnc#1149555).\n- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently\n low encryption key length and did not prevent an attacker from influencing\n the key length negotiation. This allowed practical brute-force attacks (aka\n 'KNOB') that could decrypt traffic and inject arbitrary ciphertext without\n the victim noticing (bnc#1137865).\n- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost\n functionality that translates virtqueue buffers to IOVs. A privileged guest\n user able to pass descriptors with invalid length to the host could use this\n flaw to increase their privileges on the host (bnc#1150112).\n- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been\n fixed. This issue could lead to local escalation of privilege with System\n execution privileges needed. (bnc#1150025).\n- CVE-2019-15030, CVE-2019-15031: On the powerpc platform, a local user could\n read vector registers of other users' processes via an interrupt\n (bsc#1149713).\n- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid. It is\n exploitable for privilege escalation on some Linux distributions where local\n users have /dev/video0 access, but only if the driver happens to be loaded.\n There are multiple race conditions during streaming stopping in this driver\n (part of the V4L2 subsystem). These issues are caused by wrong mutex locking\n in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(),\n sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of\n these race conditions leads to a use-after-free (bnc#1155897).\n- CVE-2019-18809: A memory leak in the af9005_identify_state() function in\n drivers/media/usb/dvb-usb/af9005.c allows attackers to cause a denial of\n service (memory consumption), aka CID-2289adbfa559 (bnc#1156258).\n- CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in\n drivers/net/wireless/ath/ath10k/usb.c allows attackers to cause a denial of\n service (memory consumption) by triggering usb_submit_urb() failures, aka\n CID-b8d17e7d93d2 (bnc#1157032).\n- CVE-2019-18660: The Linux kernel on powerpc allows Information Exposure\n because the Spectre-RSB mitigation is not in place for all applicable CPUs,\n aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and\n arch/powerpc/kernel/security.c (bnc#1157038).\n- CVE-2019-14895: A heap-based buffer overflow was discovered in Marvell WiFi\n chip driver. The flaw could occur when the station attempts a connection\n negotiation during the handling of the remote devices country settings. This\n could allow the remote device to cause a denial of service (system crash) or\n possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-19065: A memory leak in the sdma_init() function in\n drivers/infiniband/hw/hfi1/sdma.c allows attackers to cause a denial of\n service (memory consumption) by triggering rhashtable_init() failures, aka\n CID-34b3be18a04e (bnc#1157191).\n- CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function\n in drivers/net/wireless/marvell/mwifiex/pcie.c allow attackers to cause a\n denial of service (memory consumption) by triggering mwifiex_map_pci_memory()\n failures, aka CID-d10dcb615c8e (bnc#1157193).\n- CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function\n in drivers/net/wireless/marvell/mwifiex/pcie.c allows attackers to cause a\n denial of service (memory consumption) by triggering mwifiex_map_pci_memory()\n failures, aka CID-db8fd2cde932 (bnc#1157197).\n- CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in\n drivers/net/wireless/realtek/rtlwifi/usb.c allow attackers to cause a denial\n of service (memory consumption), aka CID-3f9361695113 (bnc#1157298).\n- CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in\n drivers/char/ipmi/ipmi_msghandler.c allow attackers to cause a denial of\n service (bsc#1157304).\n- CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in\n drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows attackers to\n cause a denial of service (memory consumption) by triggering usb_submit_urb()\n failures, aka CID-a2cdd07488e6 (bnc#1157307).\n- CVE-2019-19062: A memory leak in the crypto_report() function in\n crypto/crypto_user_base.c allows attackers to cause a denial of service\n (memory consumption) by triggering crypto_report_alg() failures, aka\n CID-ffdde5932042 (bnc#1157333).\n- CVE-2019-19227: In the AppleTalk subsystem, there is a potential NULL pointer\n dereference because register_snap_client may return NULL. This will lead to\n denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as\n demonstrated by unregister_snap_client, aka CID-9804501fa122 (bnc#1157678).\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the previously\n described 'Microarchitectural Data Sampling' attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation altogether (requiring CPU Microcode updates on older systems) and better flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n \n \nThe following non-security bugs were fixed:\n\n- 940:PHYP:XM: Injecting EEH till threshold causes LPAR crash with e1000e network driver in SUSE platform. (bsc#1158049)\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- ACPI / PCI: fix acpi_pci_irq_enable() memory leak (bsc#1051510).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- ACPI / property: Fix acpi_graph_get_remote_endpoint() name in kerneldoc (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- ACPI: custom_method: fix memory leaks (bsc#1051510).\n- ACPICA: Increase total number of possible Owner IDs (bsc#1148859).\n- ALSA: aoa: onyx: always initialize register read value (bsc#1051510).\n- ALSA: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: firewire-motu: add support for MOTU 4pre (bsc#1111666).\n- ALSA: firewire-tascam: check intermediate state of clock status and retry (bsc#1051510).\n- ALSA: firewire-tascam: handle error code when getting current source of clock (bsc#1051510).\n- ALSA: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda - Fix potential endless loop at applying quirks (bsc#1051510).\n- ALSA: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- ALSA: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n- ALSA: hda/realtek - Add quirk for HP Pavilion 15 (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC623 (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).\n- ALSA: hda/realtek - Enable internal speaker & headset mic of ASUS UX431FL (bsc#1051510).\n- ALSA: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek - Fix overridden device-specific initialization (bsc#1051510).\n- ALSA: hda/realtek - Fix the problem of two front mics on a ThinkCentre (bsc#1051510).\n- ALSA: hda/realtek - PCI quirk for Medion E4254 (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).\n- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda: Fix racy display power access (bsc#1156928).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: hda: kabi workaround for generic parser flag (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for Gustard U16/X26 USB Interface (bsc#1051510).\n- ALSA: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Clean up check_input_term() (bsc#1051510).\n- ALSA: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1111666).\n- ALSA: usb-audio: Fix copy&paste error in the validator (bsc#1111666).\n- ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk() (git-fixes).\n- ALSA: usb-audio: Fix incorrect size check for processing/extension units (git-fixes).\n- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n- ALSA: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).\n- ALSA: usb-audio: More validations of descriptor units (bsc#1051510).\n- ALSA: usb-audio: Remove superfluous bLength checks (bsc#1051510).\n- ALSA: usb-audio: Simplify parse_audio_unit() (bsc#1051510).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- ALSA: usb-audio: Unify audioformat release code (bsc#1051510).\n- ALSA: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).\n- ALSA: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).\n- ALSA: usb-audio: fix PCM device order (bsc#1051510).\n- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n- ALSA: usb-audio: remove some dead code (bsc#1051510).\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: Intel: Baytrail: Fix implicit fallthrough warning (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).\n- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n- ASoC: es8328: Fix copy-paste error in es8328_right_line_controls (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: sun4i-i2s: RX and TX counter registers are swapped (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- ASoC: wm8737: Fix copy-paste error in wm8737_snd_controls (bsc#1051510).\n- ASoC: wm8988: fix typo in wm8988_right_line_controls (bsc#1051510).\n- Add 3 not-needeed commits to blacklist.conf from git-fixes.\n- Add Acer Aspire Ethos 8951G model quirk (bsc#1051510).\n- Add kernel module compression support (bsc#1135854) For enabling the kernel module compress, add the item COMPRESS_MODULES='xz' in config.sh, then mkspec will pass it to the spec file.\n- Add some qedf commits to blacklist file (bsc#1149976)\n- Blacklist 'signal: Correct namespace fixups of si_pid and si_uid' (bsc#1142667)\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- Bluetooth: btqca: Add a short delay before downloading the NVM (bsc#1051510).\n- Bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- Btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- Btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- Btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- Btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- Btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- Btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- Btrfs: do not abort transaction at btrfs_update_root() after failure to COW path (bsc#1150933).\n- Btrfs: fix assertion failure during fsync and use of stale transaction (bsc#1150562).\n- Btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n- Btrfs: fix use-after-free when using the tree modification log (bsc#1151891).\n- Btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- Btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).\n- Btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).\n- Btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1152972).\n- Btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- Btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- Btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- Btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- Compile nvme.ko as module (bsc#1150846)\n- Drop an ASoC fix that was reverted in 4.14.y stable\n- Drop multiversion(kernel) from the KMP template (bsc#1127155).\n- EDAC/amd64: Adjust printed chip select sizes when interleaved (bsc#1131489).\n- EDAC/amd64: Cache secondary Chip Select registers (bsc#1131489).\n- EDAC/amd64: Decode syndrome before translating address (bsc#1114279).\n- EDAC/amd64: Decode syndrome before translating address (bsc#1131489).\n- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1131489).\n- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1131489).\n- EDAC/amd64: Recognize DRAM device type ECC capability (bsc#1131489).\n- EDAC/amd64: Recognize x16 symbol size (bsc#1131489).\n- EDAC/amd64: Set maximum channel layer size depending on family (bsc#1131489).\n- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1131489).\n- EDAC/amd64: Support more than two Unified Memory Controllers (bsc#1131489).\n- EDAC/amd64: Support more than two controllers for chip selects handling (bsc#1131489).\n- EDAC/amd64: Use a macro for iterating over Unified Memory Controllers (bsc#1131489).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- Error in postinstall scripts (bsc#1154043)\n- FW940: Activation of multiple namespaces simultaneously may leading to an activation failure (SCM/pmem) (Documentation/TID?) (bsc#1157778)\n- Fix AMD IOMMU kABI (bsc#1154610).\n- Fix NULL pointer dereference in fc_lookup_rport (bsc#1098291). \n- Fix kabi for: NFSv4: Fix OPEN / CLOSE race (git-fixes).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: cp2112: prevent sleeping function called from invalid context (bsc#1051510).\n- HID: fix error message in hid_open_report() (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/core: Add mitigation for Spectre V1 (bsc#1155671)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Free mpi in mp_slave mode (bsc#1103991).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command (bsc#1103991).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- Input: elan_i2c - remove Lenovo Legion Y7000 PnpID (bsc#1051510).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- KVM: Convert kvm_lock to a mutex (bsc#1117665).\n- KVM: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- KVM: PPC: Book3S HV: Check for MMU ready on piggybacked virtual cores (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not lose pending doorbell request on migration on P9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not push XIVE context when not using XIVE device (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix lockdep warning when entering the guest (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix race in re-enabling XIVE escalation interrupts (bsc#1061840).\n- KVM: PPC: Book3S HV: Handle virtual mode in XIVE VCPU push code (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Free escalation interrupts before disabling the VP (bsc#1061840).\n- KVM: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- KVM: PPC: Book3S: Fix incorrect guest-to-user-translation error handling (bsc#1061840).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064)\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065)\n- KVM: X86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).\n- KVM: X86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).\n- KVM: arm/arm64: Clean dcache to PoC when changing PTE due to CoW (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Detangle kvm_mmu.h from kvm_hyp.h (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Drop vcpu parameter from guest cache maintenance operartions (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Limit icache invalidation to prefetch aborts (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Only clean the dcache on translation fault (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Preserve Exec permission across R/W permission faults (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Split dcache/icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe (jsc#ECO-561).\n- KVM: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067)\n- KVM: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066)\n- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- Linux freeze on VIOS reboot (using ibmvnic) (bsc#1155689)\n- NFC: fix attrs checks in netlink interface (bsc#1051510).\n- NFC: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- NFC: netlink: fix double device reference drop (git-fixes).\n- NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- NFC: pn533: fix use-after-free and memleaks (bsc#1051510).\n- NFS4: Fix v4.0 client state corruption when mount (git-fixes).\n- NFS: Do not interrupt file writeout due to fatal errors (git-fixes).\n- NFS: Do not open code clearing of delegation state (git-fixes).\n- NFS: Ensure O_DIRECT reports an error if the bytes read/written is 0 (git-fixes).\n- NFS: Fix regression whereby fscache errors are appearing on 'nofsc' mounts (git-fixes).\n- NFS: Forbid setting AF_INET6 to 'struct sockaddr_in'->sin_family (git-fixes).\n- NFS: Refactor nfs_lookup_revalidate() (git-fixes).\n- NFS: Remove redundant semicolon (git-fixes).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- NFSv4.1: Again fix a race where CB_NOTIFY_LOCK fails to wake a waiter (git-fixes).\n- NFSv4.1: Fix open stateid recovery (git-fixes).\n- NFSv4.1: Only reap expired delegations (git-fixes).\n- NFSv4/pnfs: Fix a page lock leak in nfs_pageio_resend() (git-fixes).\n- NFSv4: Fix OPEN / CLOSE race (git-fixes).\n- NFSv4: Fix a potential sleep while atomic in nfs4_do_reclaim() (git-fixes).\n- NFSv4: Fix an Oops in nfs4_do_setattr (git-fixes).\n- NFSv4: Fix delegation state recovery (git-fixes).\n- NFSv4: Fix lookup revalidate of regular files (git-fixes).\n- NFSv4: Handle the special Linux file open access mode (git-fixes).\n- NFSv4: Only pass the delegation to setattr if we're sending a truncate (git-fixes).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI/VPD: Prevent VPD access for Amazon's Annapurna Labs Root Port (bsc#1152187,bsc#1152525).\n- PCI: Add ACS quirk for Amazon Annapurna Labs root ports (bsc#1152187,bsc#1152525).\n- PCI: Add Amazon's Annapurna Labs vendor ID (bsc#1152187,bsc#1152525).\n- PCI: Add quirk to disable MSI-X support for Amazon's Annapurna Labs Root Port (bsc#1152187,bsc#1152525).\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- PCI: al: Add Amazon Annapurna Labs PCIe host controller driver (SLE-9332).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: hv: Detect and fix Hyper-V PCI domain number collision (bsc#1150423).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PM: sleep: Fix possible overflow in pm_system_cancel_wakeup() (bsc#1051510).\n- PNFS fallback to MDS if no deviceid found (git-fixes).\n- Parametrize kgraft vs livepatch.\n- RDMA/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).\n- RDMA/efa: Add Amazon EFA driver (jsc#SLE-4805)\n- RDMA/hns: Add mtr support for mixed multihop addressing (bsc#1104427).\n- RDMA/hns: Add reset process for function-clear (bsc#1155061).\n- RDMA/hns: Bugfix for calculating qp buffer size (bsc#1104427 ).\n- RDMA/hns: Bugfix for filling the sge of srq (bsc#1104427 ).\n- RDMA/hns: Fix an error code in hns_roce_set_user_sq_size() (bsc#1104427).\n- RDMA/hns: Fix comparison of unsigned long variable 'end' with less than zero (bsc#1104427 bsc#1137236).\n- RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 ).\n- RDMA/hns: Fixs hw access invalid dma memory error (bsc#1104427 ).\n- RDMA/hns: Fixup qp release bug (bsc#1104427).\n- RDMA/hns: Modify ba page size for cqe (bsc#1104427).\n- RDMA/hns: Remove set but not used variable 'fclr_write_fail_flag' (bsc#1104427).\n- RDMA/hns: Remove the some magic number (bsc#1155061).\n- RDMA/hns: Remove unnecessary print message in aeq (bsc#1104427 ).\n- RDMA/hns: Replace magic numbers with #defines (bsc#1104427 ).\n- RDMA/hns: Set reset flag when hw resetting (bsc#1104427 ).\n- RDMA/hns: Use %pK format pointer print (bsc#1104427 ).\n- RDMA/hns: fix inverted logic of readl read and shift (bsc#1104427).\n- RDMA/hns: reset function when removing module (bsc#1104427 ).\n- RDMA/restrack: Track driver QP types in resource tracker (jsc#SLE-4805)\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- RDMa/hns: Do not stuck in endless timeout loop (bsc#1104427 ).\n- README.BRANCH: Add Denis as branch maintainer\n- Roce Statistics does not increment for Broadcom 100gb adapter. (bsc#1157115)\n- SUNRPC fix regression in umount of a secure mount (git-fixes).\n- SUNRPC/nfs: Fix return value for nfs4_callback_compound() (git-fixes).\n- SUNRPC: Handle connection breakages correctly in call_status() (git-fixes).\n- UAS: Revert commit 3ae62a42090f ('UAS: fix alignment of scatter/gather segments').\n- USB: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- USB: adutux: fix use-after-free on disconnect (bsc#1142635).\n- USB: adutux: fix use-after-free on release (bsc#1051510).\n- USB: chaoskey: fix use-after-free on release (bsc#1051510).\n- USB: chipidea: Fix otg event handler (bsc#1051510).\n- USB: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- USB: chipidea: udc: do not do hardware access if gadget has stopped (bsc#1051510).\n- USB: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- USB: gadget: composite: Clear 'suspended' on reset/disconnect (bsc#1051510).\n- USB: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- USB: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- USB: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- USB: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- USB: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- USB: handle warm-reset port requests on hub resume (bsc#1051510).\n- USB: host: fotg2: restart hcd after port reset (bsc#1051510).\n- USB: host: ohci: fix a race condition between shutdown and irq (bsc#1051510).\n- USB: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- USB: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- USB: iowarrior: fix use-after-free on release (bsc#1051510).\n- USB: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- USB: ldusb: fix control-message timeout (bsc#1051510).\n- USB: ldusb: fix memleak on disconnect (bsc#1051510).\n- USB: ldusb: fix read info leaks (bsc#1051510).\n- USB: ldusb: fix ring-buffer locking (bsc#1051510).\n- USB: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- USB: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- USB: legousbtower: fix memleak on disconnect (bsc#1051510).\n- USB: legousbtower: fix open after failed reset request (bsc#1142635).\n- USB: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- USB: legousbtower: fix slab info leak at probe (bsc#1142635).\n- USB: legousbtower: fix use-after-free on release (bsc#1051510).\n- USB: microtek: fix info-leak at probe (bsc#1142635).\n- USB: serial: fix runtime PM after driver unbind (bsc#1051510).\n- USB: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- USB: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- USB: serial: option: add Telit FN980 compositions (bsc#1051510).\n- USB: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- USB: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- USB: storage: ums-realtek: Update module parameter description for auto_delink_en (bsc#1051510).\n- USB: storage: ums-realtek: Whitelist auto-delink support (bsc#1051510).\n- USB: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- USB: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- USB: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- USB: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- USB: usbcore: Fix slab-out-of-bounds bug during device reset (bsc#1051510).\n- USB: usblcd: fix I/O after disconnect (bsc#1142635).\n- USB: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- USB: usblp: fix use-after-free on disconnect (bsc#1051510).\n- USB: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- USB: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- USB: yurex: Do not retry on unexpected errors (bsc#1051510).\n- USB: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- USBIP: add config dependency for SGL_ALLOC (git-fixes).\n- USBip: Fix free of unallocated memory in vhci tx (git-fixes).\n- USBip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n- USBip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- add mainline tags to some patches to allow further work in this branch\n- alarmtimer: Use EOPNOTSUPP instead of ENOTSUPP (bsc#1151680).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- arm64/cpufeature: Convert hook_lock to raw_spin_lock_t in cpu_enable_ssbs() (jsc#ECO-561).\n- arm64: Add decoding macros for CP15_32 and CP15_64 traps (jsc#ECO-561).\n- arm64: Add part number for Neoverse N1 (jsc#ECO-561).\n- arm64: Add silicon-errata.txt entry for ARM erratum 1188873 (jsc#ECO-561).\n- arm64: Add support for new control bits CTR_EL0.DIC and CTR_EL0.IDC (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Apply ARM64_ERRATUM_1188873 to Neoverse-N1 (jsc#ECO-561).\n- arm64: Fake the IminLine size on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix mismatched cache line size detection (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix silly typo in comment (jsc#ECO-561).\n- arm64: Force SSBS on context switch (jsc#ECO-561).\n- arm64: Handle erratum 1418040 as a superset of erratum 1188873 (jsc#ECO-561). \n- arm64: Introduce sysreg_clear_set() (jsc#ECO-561).\n- arm64: KVM: Add invalidate_icache_range helper (jsc#ECO-561,jsc#SLE-10671).\n- arm64: KVM: PTE/PMD S2 XN bit definition (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Make ARM64_ERRATUM_1188873 depend on COMPAT (jsc#ECO-561).\n- arm64: PCI: Preserve firmware configuration when desired (SLE-9332).\n- arm64: Restrict ARM64_ERRATUM_1188873 mitigation to AArch32 (jsc#ECO-561).\n- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n- arm64: arch_timer: Add workaround for ARM erratum 1188873 (jsc#ECO-561). \n- arm64: arch_timer: avoid unused function warning (jsc#ECO-561).\n- arm64: compat: Add CNTFRQ trap handler (jsc#ECO-561).\n- arm64: compat: Add CNTVCT trap handler (jsc#ECO-561).\n- arm64: compat: Add condition code checks and IT advance (jsc#ECO-561).\n- arm64: compat: Add cp15_32 and cp15_64 handler arrays (jsc#ECO-561).\n- arm64: compat: Add separate CP15 trapping hook (jsc#ECO-561).\n- arm64: compat: Workaround Neoverse-N1 #1542419 for compat user-space (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpu: Move errata and feature enable callbacks closer to callers (jsc#ECO-561).\n- arm64: cpu_errata: Remove ARM64_MISMATCHED_CACHE_LINE_SIZE (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Detect SSBS and advertise to userspace (jsc#ECO-561). \n- arm64: cpufeature: Fix handling of CTR_EL0.IDC field (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Trap CTR_EL0 access only where it is necessary (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: ctr: Fix cpu capability check for late CPUs (jsc#ECO-561,jsc#SLE-10671).\n- arm64: entry: Allow handling of undefined instructions from EL1 (jsc#ECO-561).\n- arm64: errata: Hide CTR_EL0.DIC on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: fix SSBS sanitization (jsc#ECO-561).\n- arm64: force_signal_inject: WARN if called from kernel context (jsc#ECO-561).\n- arm64: kill change_cpacr() (jsc#ECO-561).\n- arm64: kill config_sctlr_el1() (jsc#ECO-561).\n- arm64: move SCTLR_EL{1,2} assertions to <asm/sysreg.h> (jsc#ECO-561).\n- arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3 (jsc#ECO-561). \n- arm64: ssbd: Drop #ifdefs for PR_SPEC_STORE_BYPASS (jsc#ECO-561).\n- arm: KVM: Add optimized PIPT icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- ath10k: adjust skb length in ath10k_sdio_mbox_rx_packet (bsc#1111666).\n- ath10k: assign 'n_cipher_suites = 11' for WCN3990 to enable WPA3 (bsc#1111666).\n- ath10k: avoid possible memory access violation (bsc#1111666).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: skip resetting rx filter for WCN3990 (bsc#1111666).\n- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: dynack: fix possible deadlock in ath_dynack_node_{de}init (bsc#1051510).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- atm: iphase: Fix Spectre v1 vulnerability (networking-stable-19_08_08).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- bcma: fix incorrect update of BCMA_CORE_PCI_MDIO_DATA (bsc#1051510).\n- blk-flush: do not run queue for requests bypassing flush (bsc#1137959).\n- blk-flush: use blk_mq_request_bypass_insert() (bsc#1137959).\n- blk-mq-sched: decide how to handle flush rq via RQF_FLUSH_SEQ (bsc#1137959).\n- blk-mq: Fix memory leak in blk_mq_init_allocated_queue error handling (bsc#1151610).\n- blk-mq: backport fixes for blk_mq_complete_e_request_sync() (bsc#1145661).\n- blk-mq: do not allocate driver tag upfront for flush rq (bsc#1137959).\n- blk-mq: insert rq with DONTPREP to hctx dispatch list when requeue (bsc#1137959).\n- blk-mq: introduce blk_mq_complete_request_sync() (bsc#1145661).\n- blk-mq: introduce blk_mq_request_completed() (bsc#1149446).\n- blk-mq: introduce blk_mq_tagset_wait_completed_request() (bsc#1149446).\n- blk-mq: kABI fixes for blk-mq.h (bsc#1137959).\n- blk-mq: move blk_mq_put_driver_tag*() into blk-mq.h (bsc#1137959).\n- blk-mq: punt failed direct issue to dispatch list (bsc#1137959).\n- blk-mq: put the driver tag of nxt rq before first one is requeued (bsc#1137959).\n- blk-wbt: Avoid lock contention and thundering herd issue in wbt_wait (bsc#1141543).\n- blk-wbt: Avoid lock contention and thundering herd issue in wbt_wait (bsc#1141543).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: fix timeout changes for legacy request drivers (bsc#1149446).\n- block: kABI fixes for BLK_EH_DONE renaming (bsc#1142076).\n- block: rename BLK_EH_NOT_HANDLED to BLK_EH_DONE (bsc#1142076).\n- bnx2x: Disable multi-cos feature (networking-stable-19_08_08).\n- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).\n- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).\n- bnxt_en: Fix VNIC clearing logic for 57500 chips (bsc#1104745 ).\n- bnxt_en: Fix to include flow direction in L2 key (bsc#1104745 ).\n- bnxt_en: Improve RX doorbell sequence (bsc#1104745).\n- bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands (bsc#1104745).\n- bnxt_en: Use correct src_fid to determine direction of the flow (bsc#1104745).\n- bonding/802.3ad: fix link_failure_count tracking (bsc#1137069 bsc#1141013).\n- bonding/802.3ad: fix slave link initialization transition states (bsc#1137069 bsc#1141013).\n- bonding: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).\n- bonding: set default miimon value for non-arp modes if not set (bsc#1137069 bsc#1141013).\n- bonding: speed/duplex update at NETDEV_UP event (bsc#1137069 bsc#1141013).\n- bpf: Fix use after free in subprog's jited symbol removal (bsc#1109837).\n- bpf: fix BTF limits (bsc#1109837).\n- bpf: fix BTF verification of enums (bsc#1109837).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- brcmfmac: fix wrong strnchr usage (bsc#1111666).\n- brcmfmac: increase buffer for obtaining firmware capabilities (bsc#1111666).\n- brcmfmac: sdio: Disable auto-tuning around commands expected to fail (bsc#1111666).\n- brcmfmac: sdio: Do not tune while the card is off (bsc#1111666).\n- brcmsmac: Use kvmalloc() for ucode allocations (bsc#1111666).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- ccw ipl bugfix (bsc#1156471)\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- ceph: use ceph_evict_inode to cleanup inode's resource (bsc#1148133).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: validate wmm rule when setting (bsc#1111666).\n- cifs: System crash in smb2_push_mandatory_locks() (bsc#1154355)\n- cifs: handle netapp error codes (bsc#1136261).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: at91: fix update bit maps on CFG_MOR write (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n- clk: sunxi-ng: v3s: add missing clock slices for MMC2 module clocks (bsc#1051510).\n- clk: sunxi-ng: v3s: add the missing PLL_DDR1 (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- config: arm64: enable erratum 1418040 and 1542419\n- crypto: af_alg - Fix race around ctx->rcvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: caam - fix concurrency issue in givencrypt descriptor (bsc#1051510).\n- crypto: caam - free resources in case caam_rng registration failed (bsc#1051510).\n- crypto: caam/qi - fix error handling in ERN handler (bsc#1111666).\n- crypto: cavium/zip - Add missing single_release() (bsc#1051510).\n- crypto: ccp - Reduce maximum stack usage (bsc#1051510).\n- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n- crypto: qat - Silence smp_processor_id() warning (bsc#1051510).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: skcipher - Unmap pages after an external error (bsc#1051510).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cx82310_eth: fix a memory leak bug (bsc#1051510).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: do not dma memory off of the stack (bsc#1152790).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127354 bsc#1127371).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).\n- dma-buf/sw_sync: Synchronize signal vs syncpt free (bsc#1111666).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: dw: platform: Switch to acpi_dma_controller_register() (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- dmaengine: iop-adma.c: fix printk format warning (bsc#1051510).\n- documationat fix: adding a Network Bridge (bsc#1117169)\n- drivers: thermal: int340x_thermal: Fix sysfs race condition (bsc#1051510).\n- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)\n- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).\n- drm/amd/display: fix odm combine pipe reset (bsc#1111666).\n- drm/amd/display: reprogram VM config when system resume (bsc#1111666).\n- drm/amd/display: support spdif (bsc#1111666).\n- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).\n- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).\n- drm/amdgpu/powerplay/vega10: allow undervolting in p7 (bsc#1111666).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Add APTX quirk for Dell Latitude 5495 (bsc#1142635)\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).\n- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).\n- drm/amdgpu: fix memory leak (bsc#1111666).\n- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/atomic_helper: Allow DPMS On<->Off changes for unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/cml: Add second PCH ID for CMP (bsc#1111666).\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)\n- drm/i915/ilk: Fix warning when reading emon_status with no output (bsc#1111666).\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915: Do not deballoon unused ggtt drm_mm_node in linux guest (bsc#1142635)\n- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).\n- drm/i915: Fix various tracepoints for gen2 (bsc#1113722)\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Restore relaxed padding (OCL_OOB_SUPPRES_ENABLE) for skl+ (bsc#1142635)\n- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/imx: Drop unused imx-ipuv3-crtc.o build (bsc#1113722)\n- drm/mediatek: set DMA max segment size (bsc#1111666).\n- drm/msm/dpu: handle failures while initializing displays (bsc#1111666).\n- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/msm/dsi: Implement reset correctly (bsc#1154048)\n- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).\n- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)\n- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/panel: check failure cases in the probe func (bsc#1111666).\n- drm/panel: make drm_panel.h self-contained (bsc#1111666).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).\n- drm/stm: attach gem fence to atomic state (bsc#1111666).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm: add __user attribute to ptr_to_compat() (bsc#1111666).\n- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).\n- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- eeprom: at24: make spd world-readable again (git-fixes).\n- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).\n- efi/memattr: Do not bail on zero VA if it equals the region's PA (bsc#1051510).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- ext4: fix warning inside ext4_convert_unwritten_extents_endio (bsc#1152025).\n- ext4: set error return correctly when ext4_htree_store_dirent fails (bsc#1152024).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- floppy: fix usercopy direction (bsc#1111666).\n- gpio: Move gpiochip_lock/unlock_as_irq to gpio/driver.h (bsc#1051510).\n- gpio: fix line flag validation in lineevent_create (bsc#1051510).\n- gpio: fix line flag validation in linehandle_create (bsc#1051510).\n- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and blacklist (bsc#1051510).\n- gpiolib: only check line handle flags once (bsc#1051510).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).\n- hwmon: (lm75) Fix write operations for negative temperatures (bsc#1051510).\n- hwmon: (shtc1) fix shtc1 and shtw1 id mask (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- i2c: designware: Synchronize IRQs when unregistering slave client (bsc#1111666).\n- i2c: emev2: avoid race when unregistering slave client (bsc#1051510).\n- i2c: piix4: Fix port selection for AMD Family 16h Model 30h (bsc#1051510).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- i40e: Add support for X710 device (bsc#1151067).\n- ibmvnic: Do not process reset during or after device removal (bsc#1149652 ltc#179635).\n- ice: fix potential infinite loop because loop counter being too small (bsc#1118661).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ife: error out when nla attributes are empty (networking-stable-19_08_08).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: dac: ad5380: fix incorrect assignment to val (bsc#1051510).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- intel_th: pci: Add Tiger Lake support (bsc#1051510).\n- intel_th: pci: Add support for another Lewisburg PCH (bsc#1051510).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Fix race in increase_address_space() (bsc#1150860).\n- iommu/amd: Flush old domains in kdump kernel (bsc#1150861).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain->updated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- iommu/dma: Fix for dereferencing before null checking (bsc#1151667).\n- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151662).\n- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151671).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063)\n- iommu: Do not use sme_active() in generic code (bsc#1151661).\n- ip6_tunnel: fix possible use-after-free on xmit (networking-stable-19_08_08).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6/addrconf: allow adding multicast addr if IFA_F_MCAUTOJOIN is set (networking-stable-19_08_28).\n- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- irqchip/gic-v2m: Add support for Amazon Graviton variant of GICv3+GICv2m (SLE-9332).\n- irqchip/gic-v3-its: Fix LPI release for Multi-MSI devices (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix command queue pointer comparison bug (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix misuse of GENMASK macro (jsc#ECO-561).\n- irqdomain: Add the missing assignment of domain->fwnode for named fwnode (bsc#1111666).\n- isdn/capi: check message length in capi_write() (bsc#1051510).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- iwlwifi: drop packets with bad status in CD (bsc#1111666).\n- iwlwifi: exclude GEO SAR support for 3168 (bsc#1111666).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- iwlwifi: fix bad dma handling in page_mem dumping flow (bsc#1120902).\n- iwlwifi: fw: do not send GEO_TX_POWER_LIMIT command to FW version 36 (bsc#1111666).\n- iwlwifi: fw: use helper to determine whether to dump paging (bsc#1106434). Patch needed to be adjusted, because our tree does not have the global variable IWL_FW_ERROR_DUMP_PAGING\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: use correct FIFO length (bsc#1111666).\n- iwlwifi: pcie: fit reclaim msg to MAX_MSG_LEN (bsc#1111666).\n- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).\n- iwlwifi: pcie: read correct prph address for newer devices (bsc#1111666).\n- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 ).\n- ixgbe: fix possible deadlock in ixgbe_service_task() (bsc#1113994).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 ).\n- kABI protect enum RDMA_DRIVER_EFA (jsc#SLE-4805)\n- kABI protect struct vmem_altmap (bsc#1150305).\n- kABI workaround for ath10k hw_filter_reset_required field (bsc#1111666).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_connector.registered type changes (bsc#1111666).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for iwlwifi iwl_rx_cmd_buffer change (bsc#1111666).\n- kABI workaround for mmc_host retune_crc_disable flag addition (bsc#1111666).\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kABI/severities: Whitelist a couple of xive functions xive_cleanup_irq_data and xive_native_populate_irq_data are exported by the xive interupt controller driver and used by KVM. I do not expect any out-of-tree driver can sanely use these.\n- kABI/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can't be expected of OOT code.\n- kABI: media: em28xx: fix handler for vidioc_s_input() (bsc#1051510). fixes kABI\n- kABI: media: em28xx: stop rewriting device's struct (bsc#1051510). fixes kABI\n- kABI: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-binary.spec.in: Obsolete kgraft packages only when not building them.\n- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578). \n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354).\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- keys: Fix missing null pointer check in request_key_auth_describe() (bsc#1051510).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- lan78xx: Fix memory leaks (bsc#1051510).\n- leds: leds-lp5562 allow firmware files up to the maximum length (bsc#1051510).\n- leds: trigger: gpio: GPIO 0 is valid (bsc#1051510).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- libertas_tf: Use correct channel range in lbtf_geo_init (bsc#1051510).\n- libiscsi: do not try to bypass SCSI EH (bsc#1142076).\n- libnvdimm/altmap: Track namespace boundaries in altmap (bsc#1150305).\n- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).\n- libnvdimm: prevent nvdimm from requesting key when security is disabled (bsc#1137982).\n- lightnvm: remove dependencies on BLK_DEV_NVME and PCI (bsc#1150846).\n- liquidio: add cleanup in octeon_setup_iq() (bsc#1051510).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- livepatch: Nullify obj->mod in klp_module_coming()'s error path (bsc#1071995).\n- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).\n- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).\n- lpfc: Add additional discovery log messages (bsc#1154521).\n- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).\n- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).\n- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).\n- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).\n- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).\n- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).\n- lpfc: Make FW logging dynamically configurable (bsc#1154521).\n- lpfc: Remove lock contention target write path (bsc#1154521).\n- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).\n- lpfc: Slight fast-path Performance optimizations (bsc#1154521).\n- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).\n- lpfc: fix coverity error of dereference after null check (bsc#1154521).\n- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).\n- lpfc: size cpu map by last cpu id set (bsc#1157160).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- mac80211: minstrel_ht: fix per-group max throughput rate initialization (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- md/raid6: Set R5_ReadError when there is read failure on parity disk (git-fixes).\n- md: do not report active array_state until after revalidate_disk() completes (git-fixes).\n- md: only call set_in_sync() when it is expected to succeed (git-fixes).\n- media: Revert '[media] marvell-ccic: reset ccic phy when stop streaming for stability' (bsc#1051510).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: atmel: atmel-isi: fix timeout value for stop streaming (bsc#1051510).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: dib0700: fix link error for dibx000_i2c_set_speed (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: em28xx: fix handler for vidioc_s_input() (bsc#1051510).\n- media: em28xx: stop rewriting device's struct (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: fdp1: Reduce FCP not found message level to debug (bsc#1051510).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: marvell-ccic: do not generate EOF on parallel bus (bsc#1051510).\n- media: mc-device.c: do not memset __user pointer contents (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov6650: Fix sensor possibly not detected on probe (bsc#1051510).\n- media: ov6650: Move v4l2_clk_get() to ov6650_video_probe() helper (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: replace strcpy() by strscpy() (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: technisat-usb2: break out of loop at end of buffer (bsc#1051510).\n- media: tm6000: double free if usb disconnect while streaming (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- media: vb2: Fix videobuf2 to map correct area (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mic: avoid statically declaring a 'struct device' (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mlxsw: spectrum_flower: Fail in case user specifies multiple mirror actions (bsc#1112374).\n- mm, page_owner, debug_pagealloc: save and dump freeing stack trace (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: decouple freeing stack trace from debug_pagealloc (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: fix off-by-one error in __set_page_owner_handle() (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: keep owner info when freeing the page (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: make init_pages_in_zone() faster (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: record page owner for each subpage (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: rename flag indicating that page is allocated (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm/memcontrol.c: fix use after free in mem_cgroup_iter() (bsc#1149224, VM Functionality).\n- mmc: core: API to temporarily disable retuning for SDIO CRC errors (bsc#1111666).\n- mmc: core: Add sdio_retune_hold_now() and sdio_retune_release() (bsc#1111666).\n- mmc: core: Fix init of SD cards reporting an invalid VDD range (bsc#1051510).\n- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n- mmc: sdhci-msm: fix mutex while in spinlock (bsc#1142635).\n- mmc: sdhci-of-arasan: Do now show error message in case of deffered probe (bsc#1119086).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n- mtd: spi-nor: Fix Cadence QSPI RCU Schedule Stall (bsc#1051510).\n- mvpp2: refactor MTU change code (networking-stable-19_08_08).\n- mwifex: free rx_cmd skb in suspended state (bsc#1111666).\n- mwifiex: do no submit URB in suspended state (bsc#1111666).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/ibmvnic: Fix missing { in __ibmvnic_reset (bsc#1149652 ltc#179635).\n- net/ibmvnic: free reset work of removed device from queue (bsc#1149652 ltc#179635).\n- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).\n- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: FWTrace, Reduce stack usage (bsc#1103990).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/mlx5: Use reversed order when unregister devices (networking-stable-19_08_08).\n- net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 ).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 ).\n- net/mlx5e: Only support tx/rx pause setting for port owner (networking-stable-19_08_21).\n- net/mlx5e: Prevent encap flow counter update async to user query (networking-stable-19_08_08).\n- net/mlx5e: Print a warning when LRO feature is dropped or not allowed (bsc#1103990).\n- net/mlx5e: Use flow keys dissector to parse packets for ARFS (networking-stable-19_08_21).\n- net/packet: fix race in tpacket_snd() (networking-stable-19_08_21).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net/sched: cbs: Fix not adding cbs instance to list (bsc#1109837).\n- net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate (bsc#1109837).\n- net/smc: do not schedule tx_work in SMC_CLOSED state (bsc#1149963).\n- net/smc: fix SMCD link group creation with VLAN id (bsc#1154959).\n- net/smc: make sure EPOLLOUT is raised (networking-stable-19_08_28).\n- net/smc: original socket family in inet_sock_diag (bsc#1149959).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- net: bridge: delete local fdb on device init failure (networking-stable-19_08_08).\n- net: bridge: mcast: do not delete permanent entries when fast leave is enabled (networking-stable-19_08_08).\n- net: fix ifindex collision during namespace removal (networking-stable-19_08_08).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net: hns3: Add missing newline at end of file (bsc#1104353 ).\n- net: hns3: add Asym Pause support to fix autoneg problem (bsc#1104353).\n- net: hns3: add a check to pointer in error_detected and slot_reset (bsc#1104353).\n- net: hns3: add aRFS support for PF (bsc#1104353).\n- net: hns3: add all IMP return code (bsc#1104353).\n- net: hns3: add check to number of buffer descriptors (bsc#1104353).\n- net: hns3: add default value for tc_size and tc_offset (bsc#1104353).\n- net: hns3: add exception handling when enable NIC HW error interrupts (bsc#1104353).\n- net: hns3: add handling of two bits in MAC tunnel interrupts (bsc#1104353).\n- net: hns3: add handshake with hardware while doing reset (bsc#1104353).\n- net: hns3: add opcode about query and clear RAS & MSI-X to special opcode (bsc#1104353).\n- net: hns3: add recovery for the H/W errors occurred before the HNS dev initialization (bsc#1104353).\n- net: hns3: add some error checking in hclge_tm module (bsc#1104353).\n- net: hns3: add support for dump firmware statistics by debugfs (bsc#1104353).\n- net: hns3: adjust hns3_uninit_phy()'s location in the hns3_client_uninit() (bsc#1104353).\n- net: hns3: bitwise operator should use unsigned type (bsc#1104353).\n- net: hns3: change GFP flag during lock period (bsc#1104353 ).\n- net: hns3: change SSU's buffer allocation according to UM (bsc#1104353).\n- net: hns3: check msg_data before memcpy in hclgevf_send_mbx_msg (bsc#1104353).\n- net: hns3: clear restting state when initializing HW device (bsc#1104353).\n- net: hns3: code optimizaition of hclge_handle_hw_ras_error() (bsc#1104353).\n- net: hns3: delay and separate enabling of NIC and ROCE HW errors (bsc#1104353).\n- net: hns3: delay ring buffer clearing during reset (bsc#1104353 ).\n- net: hns3: delay setting of reset level for hw errors until slot_reset is called (bsc#1104353).\n- net: hns3: delete the redundant user NIC codes (bsc#1104353 ).\n- net: hns3: do not configure new VLAN ID into VF VLAN table when it's full (bsc#1104353).\n- net: hns3: do not query unsupported commands in debugfs (bsc#1104353).\n- net: hns3: enable DCB when TC num is one and pfc_en is non-zero (bsc#1104353).\n- net: hns3: enable broadcast promisc mode when initializing VF (bsc#1104353).\n- net: hns3: extract handling of mpf/pf msi-x errors into functions (bsc#1104353).\n- net: hns3: fix GFP flag error in hclge_mac_update_stats() (bsc#1126390).\n- net: hns3: fix VLAN filter restore issue after reset (bsc#1104353).\n- net: hns3: fix __QUEUE_STATE_STACK_XOFF not cleared issue (bsc#1104353).\n- net: hns3: fix a -Wformat-nonliteral compile warning (bsc#1104353).\n- net: hns3: fix a memory leak issue for hclge_map_unmap_ring_to_vf_vector (bsc#1104353).\n- net: hns3: fix a statistics issue about l3l4 checksum error (bsc#1104353).\n- net: hns3: fix avoid unnecessary resetting for the H/W errors which do not require reset (bsc#1104353).\n- net: hns3: fix compile warning without CONFIG_RFS_ACCEL (bsc#1104353).\n- net: hns3: fix dereference of ae_dev before it is null checked (bsc#1104353).\n- net: hns3: fix flow control configure issue for fibre port (bsc#1104353).\n- net: hns3: fix for dereferencing before null checking (bsc#1104353).\n- net: hns3: fix for skb leak when doing selftest (bsc#1104353 ).\n- net: hns3: fix race conditions between reset and module loading & unloading (bsc#1104353).\n- net: hns3: fix some coding style issues (bsc#1104353 ).\n- net: hns3: fix some reset handshake issue (bsc#1104353 ).\n- net: hns3: fix wrong size of mailbox responding data (bsc#1104353).\n- net: hns3: fixes wrong place enabling ROCE HW error when loading (bsc#1104353).\n- net: hns3: free irq when exit from abnormal branch (bsc#1104353 ).\n- net: hns3: handle empty unknown interrupt (bsc#1104353 ).\n- net: hns3: initialize CPU reverse mapping (bsc#1104353 ).\n- net: hns3: log detail error info of ROCEE ECC and AXI errors (bsc#1104353).\n- net: hns3: make HW GRO handling compliant with SW GRO (bsc#1104353).\n- net: hns3: modify handling of out of memory in hclge_err.c (bsc#1104353).\n- net: hns3: modify hclge_init_client_instance() (bsc#1104353 ).\n- net: hns3: modify hclgevf_init_client_instance() (bsc#1104353 ).\n- net: hns3: optimize the CSQ cmd error handling (bsc#1104353 ).\n- net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353 bsc#1134983).\n- net: hns3: process H/W errors occurred before HNS dev initialization (bsc#1104353).\n- net: hns3: re-schedule reset task while VF reset fail (bsc#1104353).\n- net: hns3: refactor PF/VF RSS hash key configuration (bsc#1104353).\n- net: hns3: refactor hns3_get_new_int_gl function (bsc#1104353 ).\n- net: hns3: refine the flow director handle (bsc#1104353 ).\n- net: hns3: remove RXD_VLD check in hns3_handle_bdinfo (bsc#1104353).\n- net: hns3: remove VF VLAN filter entry inexistent warning print (bsc#1104353).\n- net: hns3: remove override_pci_need_reset (bsc#1104353 ).\n- net: hns3: remove redundant core reset (bsc#1104353 ).\n- net: hns3: remove setting bit of reset_requests when handling mac tunnel interrupts (bsc#1104353).\n- net: hns3: remove unused linkmode definition (bsc#1104353 ).\n- net: hns3: replace numa_node_id with numa_mem_id for buffer reusing (bsc#1104353).\n- net: hns3: set default value for param 'type' in hclgevf_bind_ring_to_vector (bsc#1104353).\n- net: hns3: set maximum length to resp_data_len for exceptional case (bsc#1104353).\n- net: hns3: set ops to null when unregister ad_dev (bsc#1104353 ).\n- net: hns3: set the port shaper according to MAC speed (bsc#1104353).\n- net: hns3: small changes for magic numbers (bsc#1104353 ).\n- net: hns3: some changes of MSI-X bits in PPU(RCB) (bsc#1104353 ).\n- net: hns3: some modifications to simplify and optimize code (bsc#1104353).\n- net: hns3: some variable modification (bsc#1104353).\n- net: hns3: stop schedule reset service while unloading driver (bsc#1104353).\n- net: hns3: sync VLAN filter entries when kill VLAN ID failed (bsc#1104353).\n- net: hns3: trigger VF reset if a VF had an over_8bd_nfe_err (bsc#1104353).\n- net: hns3: typo in the name of a constant (bsc#1104353 ).\n- net: hns3: use HCLGEVF_STATE_NIC_REGISTERED to indicate VF NIC client has registered (bsc#1104353).\n- net: hns3: use HCLGE_STATE_NIC_REGISTERED to indicate PF NIC client has registered (bsc#1104353).\n- net: hns3: use HCLGE_STATE_ROCE_REGISTERED to indicate PF ROCE client has registered (bsc#1104353).\n- net: hns3: use macros instead of magic numbers (bsc#1104353 ).\n- net: hns: Fix the stray netpoll locks causing deadlock in NAPI path (bsc#1104353).\n- net: hns: add support for vlan TSO (bsc#1104353).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 ).\n- net: phylink: Fix flow control resolution (bsc#1119113 ).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net: sched: Fix a possible null-pointer dereference in dequeue_func() (networking-stable-19_08_08).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: sched: cbs: Avoid division by zero when calculating the port rate (bsc#1109837).\n- net: sched: fix possible crash in tcf_action_destroy() (bsc#1109837).\n- net: sched: fix reordering issues (bsc#1109837).\n- net: sock_map, fix missing ulp check in sock hash case (bsc#1109837).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs (bsc#1109837).\n- nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs (bsc#1109837).\n- nfsd: Do not release the callback slot unless it was actually held (git-fixes).\n- nfsd: Fix overflow causing non-working mounts on 1 TB machines (bsc#1150381).\n- nfsd: degraded slot-count more gracefully as allocation nears exhaustion (bsc#1150381).\n- nfsd: fix performance-limiting session calculation (bsc#1150381).\n- nfsd: give out fewer session slots as limit approaches (bsc#1150381).\n- nfsd: handle drc over-allocation gracefully (bsc#1150381).\n- nfsd: increase DRC cache limit (bsc#1150381).\n- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- null_blk: complete requests from ->timeout (bsc#1149446).\n- null_blk: wire up timeouts (bsc#1149446).\n- nvme-fc: fix module unloads while lports still pending (bsc#1150033).\n- nvme-multipath: relax ANA state check (bsc#1123105).\n- nvme-rdma: Allow DELETING state change failure in (bsc#1104967,).\n- nvme-rdma: centralize admin/io queue teardown sequence (bsc#1142076).\n- nvme-rdma: centralize controller setup sequence (bsc#1142076).\n- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-rdma: fix timeout handler (bsc#1149446).\n- nvme-rdma: fix timeout handler (bsc#1149446).\n- nvme-rdma: remove redundant reference between ib_device and tagset (bsc#1149446).\n- nvme-rdma: stop admin queue before freeing it (bsc#1140155).\n- nvme-rdma: support up to 4 segments of inline data (bsc#1142076).\n- nvme-rdma: unquiesce queues when deleting the controller (bsc#1142076).\n- nvme-rdma: use dynamic dma mapping per command (bsc#1149446).\n- nvme-tcp: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-tcp: fix timeout handler (bsc#1149446).\n- nvme-tcp: support C2HData with SUCCESS flag (bsc#1157386).\n- nvme: cancel request synchronously (bsc#1145661).\n- nvme: do not abort completed request in nvme_cancel_request (bsc#1149446).\n- nvme: fix multipath crash when ANA is deactivated (bsc#1149446).\n- nvme: fix multipath crash when ANA is deactivated (bsc#1149446).\n- nvme: remove ns sibling before clearing path (bsc#1140155).\n- nvme: return BLK_EH_DONE from ->timeout (bsc#1142076).\n- nvme: wait until all completed request's complete fn is called (bsc#1149446).\n- nvmem: Use the same permissions for eeprom as for nvmem (git-fixes).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- perf/x86/amd: Change/fix NMI latency mitigation to use a timestamp (bsc#1142924).\n- phy: renesas: rcar-gen3-usb2: Disable clearing VBUS in over-current (bsc#1051510).\n- phylink: fix kernel-doc warnings (bsc#1111666).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).\n- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC227E to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- pnfs/flexfiles: Fix PTR_ERR() dereferences in ff_layout_track_ds_error (git-fixes).\n- pnfs/flexfiles: Turn off soft RPC calls (git-fixes).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: reset: gpio-restart: Fix typo when gpio reset is not found (bsc#1051510).\n- power: supply: Init device wakeup after device_add() (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/64: Make sys_switch_endian() traceable (bsc#1065729).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: Fix MADV_[FREE|DONTNEED] TLB flush miss problem with THP (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Fix memory hot-unplug page table split (bsc#1065729).\n- powerpc/64s/radix: Fix memory hotplug section page table creation (bsc#1065729).\n- powerpc/64s/radix: Implement _tlbie(l)_va_range flush functions (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Improve TLB flushing for page table freeing (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Improve preempt handling in TLB code (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Introduce local single page ceiling for TLB range\n- powerpc/64s/radix: Optimize flush_tlb_range (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/book3s64/mm: Do not do tlbie fixup for some hardware revisions (bsc#1152161 ltc#181664).\n- powerpc/book3s64/radix: Rename CPU_FTR_P9_TLBIE_BUG feature flag (bsc#1152161 ltc#181664).\n- powerpc/bpf: use unsigned division instruction for 64-bit operations (bsc#1065729).\n- powerpc/irq: Do not WARN continuously in arch_local_irq_restore() (bsc#1065729).\n- powerpc/irq: drop arch_early_irq_init() (bsc#1065729).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm/radix: Drop unneeded NULL check (bsc#1152161 ltc#181664).\n- powerpc/mm/radix: implement LPID based TLB flushes to be used by KVM (bsc#1152161 ltc#181664).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm: Fixup tlbie vs mtpidr/mtlpidr ordering issue on POWER9 (bsc#1152161 ltc#181664).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm: Simplify page_is_ram by using memblock_is_memory (bsc#1065729).\n- powerpc/mm: Use memblock API for PPC32 page_is_ram (bsc#1065729).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/module64: Fix comment in R_PPC64_ENTRY handling (bsc#1065729).\n- powerpc/powernv/ioda2: Allocate TCE table levels on demand for default DMA window (bsc#1061840).\n- powerpc/powernv/ioda: Fix race in TCE level allocation (bsc#1061840).\n- powerpc/powernv/npu: Remove obsolete comment about TCE_KILL_INVAL_ALL (bsc#1065729).\n- powerpc/powernv: Fix compile without CONFIG_TRACEPOINTS (bsc#1065729).\n- powerpc/powernv: Flush console before platform error reboot (bsc#1149940 ltc#179958).\n- powerpc/powernv: Restrict OPAL symbol map to only be readable by root (bsc#1152885).\n- powerpc/powernv: Use kernel crash path for machine checks (bsc#1149940 ltc#179958).\n- powerpc/powernv: move OPAL call wrapper tracing and interrupt handling to C (bsc#1065729).\n- powerpc/pseries, ps3: panic flush kernel messages before halting system (bsc#1149940 ltc#179958).\n- powerpc/pseries/memory-hotplug: Fix return value type of find_aa_index (bsc#1065729).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Call H_BLOCK_REMOVE when supported (bsc#1109158).\n- powerpc/pseries: Export maximum memory value (bsc#1122363).\n- powerpc/pseries: Export raw per-CPU VPA data via debugfs ().\n- powerpc/pseries: Fix cpu_hotplug_lock acquisition in resize_hpt() (bsc#1065729).\n- powerpc/pseries: Read TLB Block Invalidate Characteristics (bsc#1109158).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n- powerpc/pseries: correctly track irq state in default idle (bsc#1150727 ltc#178925).\n- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n- powerpc/ptrace: Simplify vr_get/set() to avoid GCC warning (bsc#1148868).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/xive: Fix bogus error code returned by OPAL (bsc#1065729).\n- powerpc/xive: Implement get_irqchip_state method for XIVE to fix shutdown race (bsc#1065729).\n- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n- powerpc/xmon: Fix opcode being uninitialized in print_insn_powerpc (bsc#1065729).\n- powerpc: BPF base kernel fixes (bsc#1157698)\n- powerpc: Drop page_is_ram() and walk_system_ram_range() (bsc#1065729).\n- powerpc: bpf: Fix generation of load/store DW instructions (bsc#1065729).\n- powerpc: dump kernel log before carrying out fadump or kdump (bsc#1149940 ltc#179958).\n- powerplay: Respect units on max dcfclk watermark (bsc#1111666).\n- ppp: Fix memory leak in ppp_write (git-fixes).\n- printk/panic: Avoid deadlock in printk() after stopping CPUs by NMI (bsc#1148712).\n- printk: Do not lose last line in kmsg buffer dump (bsc#1152460).\n- printk: fix printk_time race (bsc#1152466).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qla2xxx: kABI fixes for v10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- qla2xxx: remove SGI SN2 support (bsc#1123034 bsc#1131304 bsc#1127988).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- quota: fix wrong condition in is_quota_modification() (bsc#1152026).\n- qxl: fix null-pointer crash during suspend (bsc#1111666).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- r8152: Set memory to all 0xFFs on failed reg reads (bsc#1051510).\n- rds: Fix warning (bsc#1154848).\n- regression fix: losetup --logical-blocksize does not work (bsc#1108043)\n- regulator: lm363x: Fix off-by-one n_voltages for lm3632 ldo_vpos/ldo_vneg (bsc#1051510).\n- reiserfs: fix extended attributes on the root directory (bsc#1151225).\n- rpm/config.sh: Enable kgraft.\n- rpm/config.sh: Enable livepatch.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: remove code duplicated by merge.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with '.ko' which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize '.ko.xz' in addition to '.ko'.\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtlwifi: Fix file release memory leak (bsc#1111666).\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- s390/pci: add mio_enabled attribute (bsc#1152665 LTC#181729).\n- s390/pci: correctly handle MIO opt-out (bsc#1152665 LTC#181729).\n- s390/pci: deal with devices that have no support for MIO instructions (bsc#1152665 LTC#181729).\n- s390/pci: fix MSI message data (bsc#1152697 LTC#181730).\n- s390: add support for IBM z15 machines (bsc#1152696 LTC#181731).\n- s390: fix setting of mio addressing control (bsc#1152665 LTC#181729).\n- sc16is7xx: Fix for 'Unexpected interrupt: 8' (bsc#1051510).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scripts/arch-symbols: add missing link.\n- scripts/git_sort/git_sort.py:\n- scripts/run_oldconfig.sh: Fix update-vanilla When CC is set we want to use it for native only. Cross-compilation still needs the crosscompilers. flush (bsc#1055117 bsc#1152161 ltc#181664).\n- scsi: bfa: convert to strlcpy/strlcat (git-fixes).\n- scsi: cxlflash: Prevent deadlock when adapter probe fails (git-fixes).\n- scsi: lpfc: Add enablement of multiple adapter dumps (bsc#1154601).\n- scsi: lpfc: Add registration for CPU Offline/Online events (bsc#1154601).\n- scsi: lpfc: Change default IRQ model on AMD architectures (bsc#1154601).\n- scsi: lpfc: Check queue pointer before use (bsc#1154242).\n- scsi: lpfc: Clarify FAWNN error message (bsc#1154601).\n- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).\n- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).\n- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).\n- scsi: lpfc: Fix NULL check before mempool_destroy is not needed (bsc#1154601).\n- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).\n- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_get_sgl_per_hdwq() (bsc#1154601).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_sli4_enable_intr() (bsc#1154601).\n- scsi: lpfc: Fix configuration of BB credit recovery in service parameters (bsc#1154601).\n- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).\n- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).\n- scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow (bsc#1154601).\n- scsi: lpfc: Fix dynamic fw log enablement check (bsc#1154601).\n- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).\n- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).\n- scsi: lpfc: Fix kernel crash at lpfc_nvme_info_show during remote port bounce (bsc#1154601).\n- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).\n- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).\n- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).\n- scsi: lpfc: Fix lpfc_cpumask_of_node_init() (bsc#1154601).\n- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).\n- scsi: lpfc: Fix reset recovery paths that are not recovering (bsc#1144375).\n- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).\n- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).\n- scsi: lpfc: Fix unexpected error messages during RSCN handling (bsc#1154601).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1154601).\n- scsi: lpfc: Initialize cpu_map for not present cpus (bsc#1154601).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).\n- scsi: lpfc: Make lpfc_debugfs_ras_log_data static (bsc#1154601).\n- scsi: lpfc: Mitigate high memory pre-allocation by SCSI-MQ (bsc#1154601).\n- scsi: lpfc: Raise config max for lpfc_fcp_mq_threshold variable (bsc#1154601).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: Resolve checker warning for lpfc_new_io_buf() (bsc#1144375).\n- scsi: lpfc: Sync with FC-NVMe-2 SLER change to require Conf with SLER (bsc#1154601).\n- scsi: lpfc: Update async event logging (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.6.0.1 (bsc#1154601).\n- scsi: lpfc: Update lpfc version to 12.6.0.2 (bsc#1154601).\n- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).\n- scsi: lpfc: fix build error of lpfc_debugfs.c for vfree/vmalloc (bsc#1154601).\n- scsi: lpfc: fix inlining of lpfc_sli4_cleanup_poll_list() (bsc#1154601).\n- scsi: lpfc: fix spelling error in MAGIC_NUMER_xxx (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_get_scsi_buf_s3(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: lpfc_attr: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: lpfc_nvmet: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: lpfc: revise nvme max queues to be hdwq count (bsc#1154601).\n- scsi: qedf: Add debug information for unsolicited processing (bsc#1149976).\n- scsi: qedf: Add shutdown callback handler (bsc#1149976).\n- scsi: qedf: Add support for 20 Gbps speed (bsc#1149976).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1149976).\n- scsi: qedf: Check for link state before processing LL2 packets and send fipvlan retries (bsc#1149976).\n- scsi: qedf: Check for module unloading bit before processing link update AEN (bsc#1149976).\n- scsi: qedf: Decrease the LL2 MTU size to 2500 (bsc#1149976).\n- scsi: qedf: Fix race betwen fipvlan request and response path (bsc#1149976).\n- scsi: qedf: Initiator fails to re-login to switch after link down (bsc#1149976).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qedf: Print message during bailout conditions (bsc#1149976).\n- scsi: qedf: Stop sending fipvlan request on unload (bsc#1149976).\n- scsi: qedf: Update module description string (bsc#1149976).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1149976).\n- scsi: qedf: Update the version to 8.42.3.0 (bsc#1149976).\n- scsi: qedf: Use discovery list to traverse rports (bsc#1149976).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: remove set but not used variables (bsc#1149976).\n- scsi: qedi: remove declaration of nvm_image from stack (git-fixes).\n- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add new FW dump template entry types (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add pci function reset support (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add protection mask module parameters (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add support for setting port speed (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Allow NVMe IO to resume with short cable pull (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Always check the qla2x00_wait_for_hba_online() return value (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Always check the qla2x00_wait_for_hba_online() return value (bsc#1143706).\n- scsi: qla2xxx: Avoid PCI IRQ affinity mapping when multiqueue is not supported (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that Coverity complains about dereferencing a NULL rport pointer (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that lockdep complains about unsafe locking in tcm_qla2xxx_close_session() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that qla2x00_mem_free() crashes if called twice (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Change abort wait_loop from msleep to wait_event_timeout (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change data_dsd into an array (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change data_dsd into an array (bsc#1143706).\n- scsi: qla2xxx: Change default ZIO threshold (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla24xx_read_flash_data() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla24xx_read_flash_data() (bsc#1143706).\n- scsi: qla2xxx: Change the return type of qla2x00_update_ms_fdmi_iocb() into void (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla2x00_update_ms_fdmi_iocb() into void (bsc#1143706).\n- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check secondary image if reading the primary image fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check secondary image if reading the primary image fails (bsc#1143706).\n- scsi: qla2xxx: Check the PCI info string output buffer size (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check the PCI info string output buffer size (bsc#1143706).\n- scsi: qla2xxx: Check the size of firmware data structures at compile time (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanup fcport memory to prevent leak (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a command is released that is owned by the firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a mailbox command times out (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a mailbox command times out (bsc#1143706).\n- scsi: qla2xxx: Complain if a soft reset fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a soft reset fails (bsc#1143706).\n- scsi: qla2xxx: Complain if parsing the version string fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if parsing the version string fails (bsc#1143706).\n- scsi: qla2xxx: Complain if sp->done() is not called from the completion path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if sp->done() is not called from the completion path (bsc#1143706).\n- scsi: qla2xxx: Complain if waiting for pending commands times out (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if waiting for pending commands times out (bsc#1143706).\n- scsi: qla2xxx: Complain loudly about reference count underflow (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correct error handling during initialization failures (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare fourth qla2x00_set_model_info() argument const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare fourth qla2x00_set_model_info() argument const (bsc#1143706).\n- scsi: qla2xxx: Declare local symbols static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla24xx_build_scsi_crc_2_iocbs() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla2x00_find_new_loop_id() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla_tgt_cmd.cdb const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla_tgt_cmd.cdb const (bsc#1143706).\n- scsi: qla2xxx: Declare the fourth ql_dump_buffer() argument const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare the fourth ql_dump_buffer() argument const (bsc#1143706).\n- scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Do not corrupt vha->plogi_ack_list (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Do not corrupt vha->plogi_ack_list (bsc#1143706).\n- scsi: qla2xxx: Downgrade driver to 10.01.00.19-k There are upstream bug reports against 10.01.00.19-k which haven't been resolved. Also the newer version failed to get a proper review. For time being it's better to got with the older version and do not introduce new bugs.\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Enable type checking for the SRB free and done callback functions (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Enable type checking for the SRB free and done callback functions (bsc#1143706).\n- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix DMA unmap leak (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix NULL pointer crash due to stale CPUID (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NVME cmd and LS cmd timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NVMe port discovery after a short device port loss (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix Nport ID display value (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix Relogin to prevent modifying scan_state flag (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix SRB allocation flag to avoid sleeping in IRQ context (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix a NULL pointer dereference (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a NULL pointer dereference (bsc#1143706).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix a qla24xx_enable_msix() error path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a race condition between aborting and completing a SCSI command (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a race condition between aborting and completing a SCSI command (bsc#1143706).\n- scsi: qla2xxx: Fix a recently introduced kernel warning (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a small typo in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix abort timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix comment alignment in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix different size DMA Alloc/Unmap (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver reload for ISP82xx (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix driver reload for ISP82xx (bsc#1143706).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload when FC-NVMe LUNs are connected (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix flash read for Qlogic ISPs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix flash read for Qlogic ISPs (bsc#1143706).\n- scsi: qla2xxx: Fix formatting of pointer types (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix fw dump corruption (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix fw options handle eh_bus_reset() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix gnl.l memory leak on adapter init failure (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hang in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hardirq-unsafe locking (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hardlockup in abort command during driver remove (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix kernel crash after disconnecting NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix message indicating vectors used by driver (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix message indicating vectors used by driver (bsc#1143706).\n- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix possible fcport null-pointer dereferences (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix premature timer expiration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix qla24xx_process_bidir_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix qla24xx_process_bidir_cmd() (bsc#1143706).\n- scsi: qla2xxx: Fix race conditions in the code for aborting SCSI commands (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session cleanup hang (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session lookup in qlt_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session lookup in qlt_abort_work() (bsc#1143706).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stale session (bsc#1143706).\n- scsi: qla2xxx: Fix stuck login session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stuck login session (bsc#1143706).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix use-after-free issues in qla2xxx_qpair_sp_free_dma() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Further limit FLASH region write access from SysFS (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve Linux kernel coding style conformance (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve Linux kernel coding style conformance (bsc#1143706).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Include the <asm/unaligned.h> header file from qla_dsd.h (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Include the <asm/unaligned.h> header file from qla_dsd.h (bsc#1143706).\n- scsi: qla2xxx: Increase the max_sgl_segments to 1024 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Increase the size of the mailbox arrays from 4 to 8 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Inline the qla2x00_fcport_event_handler() function (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Inline the qla2x00_fcport_event_handler() function (bsc#1143706).\n- scsi: qla2xxx: Insert spaces where required (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2x00_els_dcmd2_free() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2x00_els_dcmd2_free() (bsc#1143706).\n- scsi: qla2xxx: Introduce qla2xxx_get_next_handle() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2xxx_get_next_handle() (bsc#1143706).\n- scsi: qla2xxx: Introduce the be_id_t and le_id_t data types for FC src/dst IDs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the be_id_t and le_id_t data types for FC src/dst IDs (bsc#1143706).\n- scsi: qla2xxx: Introduce the dsd32 and dsd64 data structures (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Introduce the dsd32 and dsd64 data structures (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the function qla2xxx_init_sp() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the function qla2xxx_init_sp() (bsc#1143706).\n- scsi: qla2xxx: Leave a blank line after declarations (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Let the compiler check the type of the SCSI command context pointer (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Let the compiler check the type of the SCSI command context pointer (bsc#1143706).\n- scsi: qla2xxx: Log the status code if a firmware command fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make it explicit that ELS pass-through IOCBs use little endian (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make it explicit that ELS pass-through IOCBs use little endian (bsc#1143706).\n- scsi: qla2xxx: Make qla24xx_async_abort_cmd() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_abort_srb() again decrease the sp reference count (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_abort_srb() again decrease the sp reference count (bsc#1143706).\n- scsi: qla2xxx: Make qla2x00_mem_free() easier to verify (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_process_response_queue() easier to read (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qlt_handle_abts_completion() more robust (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qlt_handle_abts_completion() more robust (bsc#1143706).\n- scsi: qla2xxx: Make sure that aborted commands are freed (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make sure that aborted commands are freed (bsc#1143706).\n- scsi: qla2xxx: Modify NVMe include directives (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Modify NVMe include directives (bsc#1143706).\n- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move marker request behind QPair (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_clear_loop_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_is_reserved_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_set_fcport_state() from a .h into a .c file (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_set_reserved_loop_ids() definition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move the <linux/io-64-nonatomic-lo-hi.h> include directive (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move the port_state_str definition from a .h to a .c file (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Pass little-endian values to the firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent memory leak for CT req/rsp allocation (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (bsc#1143706).\n- scsi: qla2xxx: Reduce the number of casts in GID list code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the number of casts in GID list code (bsc#1143706).\n- scsi: qla2xxx: Reduce the number of forward declarations (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the scope of three local variables in qla2xxx_queuecommand() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the scope of three local variables in qla2xxx_queuecommand() (bsc#1143706).\n- scsi: qla2xxx: Reject EH_{abort|device_reset|target_request} (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove FW default template (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove a comment that refers to the SCSI host lock (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous forward declaration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous forward declaration (bsc#1143706).\n- scsi: qla2xxx: Remove a superfluous pointer check (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous pointer check (bsc#1143706).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Remove an include directive from qla_mr.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove an include directive from qla_mr.c (bsc#1143706).\n- scsi: qla2xxx: Remove dead code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove dead code (bsc#1143706).\n- scsi: qla2xxx: Remove qla_tgt_cmd.data_work and qla_tgt_cmd.data_work_free (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove qla_tgt_cmd.released (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove set but not used variable 'ptr_dma' (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove superfluous sts_entry_* casts (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove superfluous sts_entry_* casts (bsc#1143706).\n- scsi: qla2xxx: Remove the fcport test from qla_nvme_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous casts (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous if-tests (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous if-tests (bsc#1143706).\n- scsi: qla2xxx: Remove two superfluous tests (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous tests (bsc#1143706).\n- scsi: qla2xxx: Remove unnecessary locking from the target code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unnecessary null check (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unreachable code from qla83xx_idc_lock() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unreachable code from qla83xx_idc_lock() (bsc#1143706).\n- scsi: qla2xxx: Remove useless set memory to zero use memset() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Replace vmalloc + memset with vzalloc (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report invalid mailbox status codes (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report invalid mailbox status codes (bsc#1143706).\n- scsi: qla2xxx: Report the firmware status code if a mailbox command fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report the firmware status code if a mailbox command fails (bsc#1143706).\n- scsi: qla2xxx: Reset the FCF_ASYNC_{SENT|ACTIVE} flags (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Restore FAWWPN of Physical Port only for loop down (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Retry fabric Scan on IOCB queue full (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Rework key encoding in qlt_find_host_by_d_id() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Rework key encoding in qlt_find_host_by_d_id() (bsc#1143706).\n- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set the SCSI command result before calling the command done (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the qpair in SRB to NULL when SRB is released (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the responder mode if appropriate for ELS pass-through IOCBs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the responder mode if appropriate for ELS pass-through IOCBs (bsc#1143706).\n- scsi: qla2xxx: Silence Successful ELS IOCB message (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify a debug statement (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify a debug statement (bsc#1143706).\n- scsi: qla2xxx: Simplify conditional check again (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_abort_sp_done() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_abort_sp_done() (bsc#1143706).\n- scsi: qla2xxx: Simplify qla24xx_async_abort_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_async_abort_cmd() (bsc#1143706).\n- scsi: qla2xxx: Simplify qlt_lport_dump() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qlt_lport_dump() (bsc#1143706).\n- scsi: qla2xxx: Simplify qlt_send_term_imm_notif() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Skip FW dump on LOOP initialization error (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress a Coveritiy complaint about integer overflow (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress a Coveritiy complaint about integer overflow (bsc#1143706).\n- scsi: qla2xxx: Suppress multiple Coverity complaint about out-of-bounds accesses (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress multiple Coverity complaint about out-of-bounds accesses (bsc#1143706).\n- scsi: qla2xxx: Uninline qla2x00_init_timer() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Unregister resources in the opposite order of the registration order (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.00.00.13-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.16-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.19-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.19-k (bsc#1143706).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Update drivers (bsc#1137223)\n- scsi: qla2xxx: Update flash read/write routine (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use ARRAY_SIZE() in the definition of QLA_LAST_SPEED (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use Correct index for Q-Pair array (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use __le64 instead of uint32_t for sending DMA addresses to firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use __le64 instead of uint32_t[2] for sending DMA addresses to firmware (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Use an on-stack completion in qla24xx_control_vp() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use common update-firmware-options routine for ISP27xx+ (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use complete switch scan for RSCN events (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1123034 bsc#1131304 bsc#1127988). \n- scsi: qla2xxx: Use get/put_unaligned where appropriate (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use memcpy() and strlcpy() instead of strcpy() and strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use memcpy() and strlcpy() instead of strcpy() and strncpy() (bsc#1143706).\n- scsi: qla2xxx: Use mutex protection during qla2x00_sysfs_read_fw_dump() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use strlcpy() instead of strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use strlcpy() instead of strncpy() (bsc#1143706).\n- scsi: qla2xxx: Use tabs instead of spaces for indentation (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use tabs instead of spaces for indentation (bsc#1143706).\n- scsi: qla2xxx: Use tabs to indent code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Verify locking assumptions at runtime (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Verify locking assumptions at runtime (bsc#1143706).\n- scsi: qla2xxx: aborted mailbox commands (bsc#1157908)\n- scsi: qla2xxx: allow session delete to finish before create (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: avoid printf format warning (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: check for kstrtol() failure (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: cleanup trace buffer initialization (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: cleanup trace buffer initialization (bsc#1134476).\n- scsi: qla2xxx: deadlock by configfs_depend_item (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: fix broken qla2xxx 10.01.00.20-k (bsc#1157424)\n- scsi: qla2xxx: fix fcport null pointer access (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix spelling mistake 'alredy' -> 'already' (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix spelling mistake 'initializatin' -> 'initialization' (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: flush IO on chip reset or sess delete (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: move IO flush to the front of NVME rport unregistration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: multipath transport-offline qla2xxx (bsc#1151548)\n- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: on session delete, return nvme cmd (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: qla2x00_alloc_fw_dump: set ha->eft (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: remove double assignment in qla2x00_update_fcport (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: target: Fix offline port handling and host reset handling (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: scsi_transport_fc: nvme: display FC-NVMe port roles (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: sd: Defer spinning up drive while SANITIZE is in progress (git-fixes).\n- scsi: sd: Fix a race between closing an sd device and sd I/O (git-fixes).\n- scsi: sd: Fix cache_type_store() (git-fixes).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: sd: Optimal I/O size should be a multiple of physical block size (git-fixes).\n- scsi: sd: Quiesce warning if device does not report optimal I/O size (git-fixes).\n- scsi: sd_zbc: Fix potential memory leak (git-fixes).\n- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: tcm_qla2xxx: Minimize #include directives (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: ufs: fix wrong command type of UTRD for UFSHCI v2.1 (git-fixes).\n- scsi: use dma_get_cache_alignment() as minimum DMA alignment (git-fixes).\n- scsi: virtio_scsi: do not send sc payload with tmfs (git-fixes).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- scsi_transport_fc: complete requests from ->timeout (bsc#1142076).\n- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).\n- sctp: fix the transport error_count check (networking-stable-19_08_21).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- secure boot lockdown: Fix-up backport of /dev/mem access restriction \n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463)\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sky2: Disable MSI on yet another ASUS boards (P6Xxxx) (bsc#1051510).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: make slhc_free() silently accept an error pointer (bsc#1051510).\n- slip: sl_alloc(): remove unused parameter 'dev_t line' (bsc#1051510).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- spi: bcm2835aux: fix corruptions for longer spi transfers (bsc#1051510).\n- spi: bcm2835aux: remove dangerous uncontrolled read of fifo (bsc#1051510).\n- spi: bcm2835aux: unifying code between polling and interrupt driven code (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it's not ours (bsc#1111666).\n- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme->key_idx >= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- supported.conf: Mark vfio_ccw supported by SUSE, because bugs can be routed to IBM via SUSE support (jsc#SLE-6138, bsc#1151192).\n- tape: Tape library devices do not disappear after disabling zone (bsc#1138039)\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: make sure EPOLLOUT wont be missed (networking-stable-19_08_28).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- team: Add vlan tx offload to hw_enc_features (bsc#1051510).\n- team: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tools: bpftool: close prog FD before exit on showing a single program (bsc#1109837).\n- tools: bpftool: fix arguments for p_err() in do_event_pipe() (bsc#1109837).\n- tools: bpftool: fix error message (prog -> object) (bsc#1109837).\n- tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts (bsc#1082555).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tty: serial: fsl_lpuart: Use appropriate lpuart32_* I/O funcs (bsc#1111666).\n- tun: fix use-after-free when register netdev failed (bsc#1111666).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- usb-storage: Add new JMS567 revision to unusual_devs (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 ('usb-storage: Set virt_boundary_mask to avoid SG overflows') (bsc#1051510).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost/test: fix build for vhost test (bsc#1111666).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- video: ssd1307fb: Start page range at page_offset (bsc#1113722)\n- vmxnet3: update to latest ToT (bsc#1157499)\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: bcm2835_wdt: Fix module autoload (bsc#1051510).\n- watchdog: fix compile time error of pretimeout governors (bsc#1051510).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- wcn36xx: use dynamic allocation for large variables (bsc#1111666).\n- wil6210: drop Rx multicast packets that are looped-back to STA (bsc#1111666).\n- wil6210: fix freeing of rx buffers in EDMA mode (bsc#1111666).\n- wil6210: fix invalid memory access for rx_buff_mgmt debugfs (bsc#1111666).\n- wil6210: prevent usage of tx ring 0 for eDMA (bsc#1111666).\n- wil6210: set edma variables only for Talyn-MB devices (bsc#1111666).\n- wimax/i2400m: fix a memory leak bug (bsc#1051510).\n- x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16h (bsc#1114279).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/entry/64/compat: Fix stack switching for XEN PV (bsc#1108382).\n- x86/fpu: Add FPU state copying quirk to handle XRSTOR failure on Intel Skylake CPUs (bsc#1151955).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068)\n- x86/tls: Fix possible spectre-v1 in do_get_thread_area() (bsc#1114279).\n- xdp: unpin xdp umem pages in error path (bsc#1109837).\n- xen-netfront: do not assume sk_buff_head list is empty in error handling (bsc#1065600).\n- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (bsc#1065600).\n- xen/netback: Reset nr_frags before freeing skb (networking-stable-19_08_21).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xen/xenbus: fix self-deadlock after killing user process (bsc#1065600).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n- xsk: Fix registration of Rx-only sockets (bsc#1109837).\n- xsk: avoid store-tearing when assigning queues (bsc#1111666).\n- xsk: avoid store-tearing when assigning umem (bsc#1111666).\n- xsk: relax UMEM headroom alignment (bsc#1109837).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3200,SUSE-SLE-HA-12-SP5-2019-3200,SUSE-SLE-Live-Patching-12-SP5-2019-3200,SUSE-SLE-SDK-12-SP5-2019-3200,SUSE-SLE-SERVER-12-SP5-2019-3200,SUSE-SLE-WE-12-SP5-2019-3200", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3200-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3200-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3200-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html", }, { category: "self", summary: "SUSE Bug 1046299", url: "https://bugzilla.suse.com/1046299", }, { category: "self", summary: "SUSE Bug 1046303", url: "https://bugzilla.suse.com/1046303", }, { category: "self", summary: "SUSE Bug 1046305", url: "https://bugzilla.suse.com/1046305", }, { category: "self", summary: "SUSE Bug 1048942", url: "https://bugzilla.suse.com/1048942", }, { category: "self", summary: "SUSE Bug 1050244", url: "https://bugzilla.suse.com/1050244", }, { category: "self", summary: "SUSE Bug 1050536", url: "https://bugzilla.suse.com/1050536", }, { category: "self", summary: "SUSE Bug 1050545", url: "https://bugzilla.suse.com/1050545", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1054914", url: "https://bugzilla.suse.com/1054914", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1055186", url: "https://bugzilla.suse.com/1055186", }, { category: "self", summary: "SUSE Bug 1061840", url: "https://bugzilla.suse.com/1061840", }, { category: "self", summary: "SUSE Bug 1064802", url: "https://bugzilla.suse.com/1064802", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1066129", url: "https://bugzilla.suse.com/1066129", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1073513", url: "https://bugzilla.suse.com/1073513", }, { category: "self", summary: "SUSE Bug 1082555", url: "https://bugzilla.suse.com/1082555", }, { category: "self", summary: "SUSE Bug 1082635", url: "https://bugzilla.suse.com/1082635", }, { category: "self", summary: "SUSE Bug 1083647", url: "https://bugzilla.suse.com/1083647", }, { category: "self", summary: "SUSE Bug 1086323", url: "https://bugzilla.suse.com/1086323", }, { category: "self", summary: "SUSE Bug 1087092", url: "https://bugzilla.suse.com/1087092", }, { category: "self", summary: "SUSE Bug 1089644", url: "https://bugzilla.suse.com/1089644", }, { category: "self", summary: "SUSE Bug 1090631", url: "https://bugzilla.suse.com/1090631", }, { category: "self", summary: "SUSE Bug 1091041", url: "https://bugzilla.suse.com/1091041", }, { category: "self", summary: "SUSE Bug 1093205", url: "https://bugzilla.suse.com/1093205", }, { category: "self", summary: "SUSE Bug 1096254", url: "https://bugzilla.suse.com/1096254", }, { category: "self", summary: "SUSE Bug 1097583", url: "https://bugzilla.suse.com/1097583", }, { category: "self", summary: "SUSE Bug 1097584", url: "https://bugzilla.suse.com/1097584", }, { category: "self", summary: "SUSE Bug 1097585", url: "https://bugzilla.suse.com/1097585", }, { category: "self", summary: "SUSE Bug 1097586", url: "https://bugzilla.suse.com/1097586", }, { category: "self", summary: "SUSE Bug 1097587", url: "https://bugzilla.suse.com/1097587", }, { category: "self", summary: "SUSE Bug 1097588", url: "https://bugzilla.suse.com/1097588", }, { category: "self", summary: "SUSE Bug 1098291", url: "https://bugzilla.suse.com/1098291", }, { category: "self", summary: "SUSE Bug 1101674", url: "https://bugzilla.suse.com/1101674", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103991", url: "https://bugzilla.suse.com/1103991", }, { category: "self", summary: "SUSE Bug 1104353", url: "https://bugzilla.suse.com/1104353", }, { category: "self", summary: "SUSE Bug 1104427", url: "https://bugzilla.suse.com/1104427", }, { category: "self", summary: "SUSE Bug 1104745", url: "https://bugzilla.suse.com/1104745", }, { category: "self", summary: "SUSE Bug 1104967", url: "https://bugzilla.suse.com/1104967", }, { category: "self", summary: "SUSE Bug 1106434", url: "https://bugzilla.suse.com/1106434", }, { category: "self", summary: "SUSE Bug 1108043", url: "https://bugzilla.suse.com/1108043", }, { category: "self", summary: "SUSE Bug 1108382", url: "https://bugzilla.suse.com/1108382", }, { category: "self", summary: "SUSE Bug 1109158", url: "https://bugzilla.suse.com/1109158", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1111666", url: "https://bugzilla.suse.com/1111666", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1113994", url: "https://bugzilla.suse.com/1113994", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1117169", url: "https://bugzilla.suse.com/1117169", }, { category: "self", summary: "SUSE Bug 1117665", url: "https://bugzilla.suse.com/1117665", }, { category: "self", summary: "SUSE Bug 1118661", url: "https://bugzilla.suse.com/1118661", }, { category: "self", summary: "SUSE Bug 1119086", url: "https://bugzilla.suse.com/1119086", }, { category: "self", summary: "SUSE Bug 1119113", url: "https://bugzilla.suse.com/1119113", }, { category: "self", summary: "SUSE Bug 1119461", url: "https://bugzilla.suse.com/1119461", }, { category: "self", summary: "SUSE Bug 1119465", url: "https://bugzilla.suse.com/1119465", }, { category: "self", summary: "SUSE Bug 1120902", url: "https://bugzilla.suse.com/1120902", }, { category: "self", summary: "SUSE Bug 1122363", url: "https://bugzilla.suse.com/1122363", }, { category: "self", summary: "SUSE Bug 1123034", url: "https://bugzilla.suse.com/1123034", }, { category: "self", summary: "SUSE Bug 1123080", url: "https://bugzilla.suse.com/1123080", }, { category: "self", summary: "SUSE Bug 1123105", url: "https://bugzilla.suse.com/1123105", }, { category: "self", summary: "SUSE Bug 1126390", url: "https://bugzilla.suse.com/1126390", }, { category: "self", summary: "SUSE Bug 1127155", url: "https://bugzilla.suse.com/1127155", }, { category: "self", summary: "SUSE Bug 1127354", url: "https://bugzilla.suse.com/1127354", }, { category: "self", summary: "SUSE Bug 1127371", url: "https://bugzilla.suse.com/1127371", }, { category: "self", summary: "SUSE Bug 1127988", url: "https://bugzilla.suse.com/1127988", }, { category: "self", summary: "SUSE Bug 1131107", url: "https://bugzilla.suse.com/1131107", }, { category: "self", summary: "SUSE Bug 1131304", url: "https://bugzilla.suse.com/1131304", }, { category: "self", summary: "SUSE Bug 1131489", url: "https://bugzilla.suse.com/1131489", }, { category: "self", summary: "SUSE Bug 1133140", url: "https://bugzilla.suse.com/1133140", }, { category: "self", summary: "SUSE Bug 1134476", url: "https://bugzilla.suse.com/1134476", }, { category: "self", summary: "SUSE Bug 1134983", url: "https://bugzilla.suse.com/1134983", }, { category: "self", summary: "SUSE Bug 1135642", url: "https://bugzilla.suse.com/1135642", }, { category: "self", summary: "SUSE Bug 1135854", url: "https://bugzilla.suse.com/1135854", }, { category: "self", summary: "SUSE Bug 1135873", url: "https://bugzilla.suse.com/1135873", }, { category: "self", summary: "SUSE Bug 1135966", url: "https://bugzilla.suse.com/1135966", }, { category: "self", summary: "SUSE Bug 1135967", url: "https://bugzilla.suse.com/1135967", }, { category: "self", summary: "SUSE Bug 1136261", url: "https://bugzilla.suse.com/1136261", }, { category: "self", summary: "SUSE Bug 1137040", url: "https://bugzilla.suse.com/1137040", }, { category: "self", summary: "SUSE Bug 1137069", url: "https://bugzilla.suse.com/1137069", }, { category: "self", summary: "SUSE Bug 1137223", url: "https://bugzilla.suse.com/1137223", }, { category: "self", summary: "SUSE Bug 1137236", url: "https://bugzilla.suse.com/1137236", }, { category: "self", summary: "SUSE Bug 1137799", url: "https://bugzilla.suse.com/1137799", }, { category: "self", summary: "SUSE Bug 1137861", url: "https://bugzilla.suse.com/1137861", }, { category: "self", summary: "SUSE Bug 1137865", url: "https://bugzilla.suse.com/1137865", }, { category: "self", summary: "SUSE Bug 1137959", url: "https://bugzilla.suse.com/1137959", }, { category: "self", summary: "SUSE Bug 1137982", url: "https://bugzilla.suse.com/1137982", }, { category: "self", summary: "SUSE Bug 1138039", url: "https://bugzilla.suse.com/1138039", }, { category: "self", summary: "SUSE Bug 1138190", url: "https://bugzilla.suse.com/1138190", }, { category: "self", summary: "SUSE Bug 1138539", url: "https://bugzilla.suse.com/1138539", }, { category: "self", summary: "SUSE Bug 1139073", url: "https://bugzilla.suse.com/1139073", }, { category: "self", summary: "SUSE Bug 1140090", url: "https://bugzilla.suse.com/1140090", }, { category: "self", summary: "SUSE Bug 1140155", url: "https://bugzilla.suse.com/1140155", }, { category: "self", summary: "SUSE Bug 1140729", url: "https://bugzilla.suse.com/1140729", }, { category: "self", summary: "SUSE Bug 1140845", url: "https://bugzilla.suse.com/1140845", }, { category: "self", summary: "SUSE Bug 1140883", url: "https://bugzilla.suse.com/1140883", }, { category: "self", summary: "SUSE Bug 1141013", url: "https://bugzilla.suse.com/1141013", }, { category: "self", summary: "SUSE Bug 1141340", url: "https://bugzilla.suse.com/1141340", }, { category: "self", summary: "SUSE Bug 1141543", url: "https://bugzilla.suse.com/1141543", }, { category: "self", summary: "SUSE Bug 1141600", url: "https://bugzilla.suse.com/1141600", }, { category: "self", summary: "SUSE Bug 1142076", url: "https://bugzilla.suse.com/1142076", }, { category: "self", summary: "SUSE Bug 1142635", url: "https://bugzilla.suse.com/1142635", }, { category: "self", summary: "SUSE Bug 1142667", url: "https://bugzilla.suse.com/1142667", }, { category: "self", summary: "SUSE Bug 1142924", url: "https://bugzilla.suse.com/1142924", }, { category: "self", summary: "SUSE Bug 1143706", url: "https://bugzilla.suse.com/1143706", }, { category: "self", summary: "SUSE Bug 1144338", url: "https://bugzilla.suse.com/1144338", }, { category: "self", summary: "SUSE Bug 1144375", url: "https://bugzilla.suse.com/1144375", }, { category: "self", summary: "SUSE Bug 1144449", url: "https://bugzilla.suse.com/1144449", }, { category: "self", summary: "SUSE Bug 1144653", url: "https://bugzilla.suse.com/1144653", }, { category: "self", summary: "SUSE Bug 1144903", url: "https://bugzilla.suse.com/1144903", }, { category: "self", summary: "SUSE Bug 1145099", url: "https://bugzilla.suse.com/1145099", }, { category: "self", summary: "SUSE Bug 1145661", url: "https://bugzilla.suse.com/1145661", }, { category: "self", summary: "SUSE Bug 1146042", url: "https://bugzilla.suse.com/1146042", }, { category: "self", summary: "SUSE Bug 1146612", url: "https://bugzilla.suse.com/1146612", }, { category: "self", summary: "SUSE Bug 1146664", url: "https://bugzilla.suse.com/1146664", }, { category: "self", summary: "SUSE Bug 1148133", url: "https://bugzilla.suse.com/1148133", }, { category: "self", summary: "SUSE Bug 1148410", url: "https://bugzilla.suse.com/1148410", }, { category: "self", summary: "SUSE Bug 1148712", url: "https://bugzilla.suse.com/1148712", }, { category: "self", summary: "SUSE Bug 1148859", url: "https://bugzilla.suse.com/1148859", }, { category: "self", summary: "SUSE Bug 1148868", url: "https://bugzilla.suse.com/1148868", }, { category: "self", summary: "SUSE Bug 1149083", url: "https://bugzilla.suse.com/1149083", }, { category: "self", summary: "SUSE Bug 1149119", url: "https://bugzilla.suse.com/1149119", }, { category: "self", summary: "SUSE Bug 1149224", url: "https://bugzilla.suse.com/1149224", }, { category: "self", summary: "SUSE Bug 1149446", url: "https://bugzilla.suse.com/1149446", }, { category: "self", summary: "SUSE Bug 1149448", url: "https://bugzilla.suse.com/1149448", }, { category: "self", summary: "SUSE Bug 1149555", url: "https://bugzilla.suse.com/1149555", }, { category: "self", summary: "SUSE Bug 1149651", url: "https://bugzilla.suse.com/1149651", }, { category: "self", summary: "SUSE Bug 1149652", url: "https://bugzilla.suse.com/1149652", }, { category: "self", summary: "SUSE Bug 1149713", url: "https://bugzilla.suse.com/1149713", }, { category: "self", summary: "SUSE Bug 1149853", url: "https://bugzilla.suse.com/1149853", }, { category: "self", summary: "SUSE Bug 1149940", url: "https://bugzilla.suse.com/1149940", }, { category: "self", summary: "SUSE Bug 1149959", url: "https://bugzilla.suse.com/1149959", }, { category: "self", summary: "SUSE Bug 1149963", url: "https://bugzilla.suse.com/1149963", }, { category: "self", summary: "SUSE Bug 1149976", url: "https://bugzilla.suse.com/1149976", }, { category: "self", summary: "SUSE Bug 1150025", url: "https://bugzilla.suse.com/1150025", }, { category: "self", summary: "SUSE Bug 1150033", url: "https://bugzilla.suse.com/1150033", }, { category: "self", summary: "SUSE Bug 1150112", url: "https://bugzilla.suse.com/1150112", }, { category: "self", summary: "SUSE Bug 1150305", url: "https://bugzilla.suse.com/1150305", }, { category: "self", summary: "SUSE Bug 1150381", url: "https://bugzilla.suse.com/1150381", }, { category: "self", summary: "SUSE Bug 1150423", url: "https://bugzilla.suse.com/1150423", }, { category: "self", summary: "SUSE Bug 1150457", url: "https://bugzilla.suse.com/1150457", }, { category: "self", summary: "SUSE Bug 1150466", url: "https://bugzilla.suse.com/1150466", }, { category: "self", summary: "SUSE Bug 1150562", url: "https://bugzilla.suse.com/1150562", }, { category: "self", summary: "SUSE Bug 1150727", url: "https://bugzilla.suse.com/1150727", }, { category: "self", summary: "SUSE Bug 1150846", url: "https://bugzilla.suse.com/1150846", }, { category: "self", summary: "SUSE Bug 1150860", url: "https://bugzilla.suse.com/1150860", }, { category: "self", summary: "SUSE Bug 1150861", url: "https://bugzilla.suse.com/1150861", }, { category: "self", summary: "SUSE Bug 1150875", url: "https://bugzilla.suse.com/1150875", }, { category: "self", summary: "SUSE Bug 1150933", url: "https://bugzilla.suse.com/1150933", }, { category: "self", summary: "SUSE Bug 1151021", url: "https://bugzilla.suse.com/1151021", }, { category: "self", summary: "SUSE Bug 1151067", url: "https://bugzilla.suse.com/1151067", }, { category: "self", summary: "SUSE Bug 1151192", url: "https://bugzilla.suse.com/1151192", }, { category: "self", summary: "SUSE Bug 1151225", url: "https://bugzilla.suse.com/1151225", }, { category: "self", summary: "SUSE Bug 1151350", url: "https://bugzilla.suse.com/1151350", }, { category: "self", summary: "SUSE Bug 1151508", url: "https://bugzilla.suse.com/1151508", }, { category: "self", summary: "SUSE Bug 1151548", url: "https://bugzilla.suse.com/1151548", }, { category: "self", summary: "SUSE Bug 1151610", url: "https://bugzilla.suse.com/1151610", }, { category: "self", summary: "SUSE Bug 1151661", url: "https://bugzilla.suse.com/1151661", }, { category: "self", summary: "SUSE Bug 1151662", url: "https://bugzilla.suse.com/1151662", }, { category: "self", summary: "SUSE Bug 1151667", url: "https://bugzilla.suse.com/1151667", }, { category: "self", summary: "SUSE Bug 1151671", url: "https://bugzilla.suse.com/1151671", }, { category: "self", summary: "SUSE Bug 1151680", url: "https://bugzilla.suse.com/1151680", }, { category: "self", summary: "SUSE Bug 1151807", url: "https://bugzilla.suse.com/1151807", }, { category: "self", summary: "SUSE Bug 1151891", url: "https://bugzilla.suse.com/1151891", }, { category: "self", summary: "SUSE Bug 1151900", url: "https://bugzilla.suse.com/1151900", }, { category: "self", summary: "SUSE Bug 1151955", url: "https://bugzilla.suse.com/1151955", }, { category: "self", summary: "SUSE Bug 1152024", url: "https://bugzilla.suse.com/1152024", }, { category: "self", summary: "SUSE Bug 1152025", url: "https://bugzilla.suse.com/1152025", }, { category: "self", summary: "SUSE Bug 1152026", url: "https://bugzilla.suse.com/1152026", }, { category: "self", summary: "SUSE Bug 1152033", url: "https://bugzilla.suse.com/1152033", }, { category: "self", summary: "SUSE Bug 1152161", url: "https://bugzilla.suse.com/1152161", }, { category: "self", summary: "SUSE Bug 1152187", url: "https://bugzilla.suse.com/1152187", }, { category: "self", summary: "SUSE Bug 1152325", url: "https://bugzilla.suse.com/1152325", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1152460", url: "https://bugzilla.suse.com/1152460", }, { category: "self", summary: "SUSE Bug 1152466", url: "https://bugzilla.suse.com/1152466", }, { category: "self", summary: "SUSE Bug 1152525", url: "https://bugzilla.suse.com/1152525", }, { category: "self", summary: "SUSE Bug 1152624", url: "https://bugzilla.suse.com/1152624", }, { category: "self", summary: "SUSE Bug 1152665", url: "https://bugzilla.suse.com/1152665", }, { category: "self", summary: "SUSE Bug 1152685", url: "https://bugzilla.suse.com/1152685", }, { category: "self", summary: "SUSE Bug 1152696", url: "https://bugzilla.suse.com/1152696", }, { category: "self", summary: "SUSE Bug 1152697", url: "https://bugzilla.suse.com/1152697", }, { category: "self", summary: "SUSE Bug 1152782", url: "https://bugzilla.suse.com/1152782", }, { category: "self", summary: "SUSE Bug 1152788", url: "https://bugzilla.suse.com/1152788", }, { category: "self", summary: "SUSE Bug 1152790", url: "https://bugzilla.suse.com/1152790", }, { category: "self", summary: "SUSE Bug 1152791", url: "https://bugzilla.suse.com/1152791", }, { category: "self", summary: "SUSE Bug 1152885", url: "https://bugzilla.suse.com/1152885", }, { category: "self", summary: "SUSE Bug 1152972", url: "https://bugzilla.suse.com/1152972", }, { category: "self", summary: "SUSE Bug 1152974", url: "https://bugzilla.suse.com/1152974", }, { category: "self", summary: "SUSE Bug 1152975", url: "https://bugzilla.suse.com/1152975", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1153112", url: "https://bugzilla.suse.com/1153112", }, { category: "self", summary: "SUSE Bug 1153236", url: "https://bugzilla.suse.com/1153236", }, { category: "self", summary: "SUSE Bug 1153263", url: "https://bugzilla.suse.com/1153263", }, { category: "self", summary: "SUSE Bug 1153476", url: "https://bugzilla.suse.com/1153476", }, { category: "self", summary: "SUSE Bug 1153509", url: "https://bugzilla.suse.com/1153509", }, { category: "self", summary: "SUSE Bug 1153607", url: "https://bugzilla.suse.com/1153607", }, { category: "self", summary: "SUSE Bug 1153628", url: "https://bugzilla.suse.com/1153628", }, { category: "self", summary: "SUSE Bug 1153646", url: "https://bugzilla.suse.com/1153646", }, { category: "self", summary: "SUSE Bug 1153681", url: "https://bugzilla.suse.com/1153681", }, { category: "self", summary: "SUSE Bug 1153713", url: "https://bugzilla.suse.com/1153713", }, { category: "self", summary: "SUSE Bug 1153717", url: "https://bugzilla.suse.com/1153717", }, { category: "self", summary: "SUSE Bug 1153718", url: "https://bugzilla.suse.com/1153718", }, { category: "self", summary: "SUSE Bug 1153719", url: "https://bugzilla.suse.com/1153719", }, { category: "self", summary: "SUSE Bug 1153811", url: "https://bugzilla.suse.com/1153811", }, { category: "self", summary: "SUSE Bug 1153969", url: "https://bugzilla.suse.com/1153969", }, { category: "self", summary: "SUSE Bug 1154043", url: "https://bugzilla.suse.com/1154043", }, { category: "self", summary: "SUSE Bug 1154048", url: "https://bugzilla.suse.com/1154048", }, { category: "self", summary: "SUSE Bug 1154058", url: "https://bugzilla.suse.com/1154058", }, { category: "self", summary: "SUSE Bug 1154108", url: "https://bugzilla.suse.com/1154108", }, { category: "self", summary: "SUSE Bug 1154124", url: "https://bugzilla.suse.com/1154124", }, { category: "self", summary: "SUSE Bug 1154189", url: "https://bugzilla.suse.com/1154189", }, { category: "self", summary: "SUSE Bug 1154242", url: "https://bugzilla.suse.com/1154242", }, { category: "self", summary: "SUSE Bug 1154268", url: "https://bugzilla.suse.com/1154268", }, { category: "self", summary: "SUSE Bug 1154354", url: "https://bugzilla.suse.com/1154354", }, { category: "self", summary: "SUSE Bug 1154355", url: "https://bugzilla.suse.com/1154355", }, { category: "self", summary: "SUSE Bug 1154372", url: "https://bugzilla.suse.com/1154372", }, { category: "self", summary: "SUSE Bug 1154521", url: "https://bugzilla.suse.com/1154521", }, { category: "self", summary: "SUSE Bug 1154526", url: "https://bugzilla.suse.com/1154526", }, { category: "self", summary: "SUSE Bug 1154578", url: "https://bugzilla.suse.com/1154578", }, { category: "self", summary: "SUSE Bug 1154601", url: "https://bugzilla.suse.com/1154601", }, { category: "self", summary: "SUSE Bug 1154607", url: "https://bugzilla.suse.com/1154607", }, { category: "self", summary: "SUSE Bug 1154608", url: "https://bugzilla.suse.com/1154608", }, { category: "self", summary: "SUSE Bug 1154610", url: "https://bugzilla.suse.com/1154610", }, { category: "self", summary: "SUSE Bug 1154611", url: "https://bugzilla.suse.com/1154611", }, { category: "self", summary: "SUSE Bug 1154651", url: "https://bugzilla.suse.com/1154651", }, { category: "self", summary: "SUSE Bug 1154737", url: "https://bugzilla.suse.com/1154737", }, { category: "self", summary: "SUSE Bug 1154747", url: "https://bugzilla.suse.com/1154747", }, { category: "self", summary: "SUSE Bug 1154848", url: "https://bugzilla.suse.com/1154848", }, { category: "self", summary: "SUSE Bug 1154858", url: "https://bugzilla.suse.com/1154858", }, { category: "self", summary: "SUSE Bug 1154905", url: "https://bugzilla.suse.com/1154905", }, { category: "self", summary: "SUSE Bug 1154956", url: "https://bugzilla.suse.com/1154956", }, { category: "self", summary: "SUSE Bug 1154959", url: "https://bugzilla.suse.com/1154959", }, { category: "self", summary: "SUSE Bug 1155021", url: "https://bugzilla.suse.com/1155021", }, { category: "self", summary: "SUSE Bug 1155061", url: "https://bugzilla.suse.com/1155061", }, { category: "self", summary: "SUSE Bug 1155178", url: "https://bugzilla.suse.com/1155178", }, { category: "self", summary: "SUSE Bug 1155179", url: "https://bugzilla.suse.com/1155179", }, { category: "self", summary: "SUSE Bug 1155184", url: "https://bugzilla.suse.com/1155184", }, { category: "self", summary: "SUSE Bug 1155186", url: "https://bugzilla.suse.com/1155186", }, { category: "self", summary: "SUSE Bug 1155671", url: "https://bugzilla.suse.com/1155671", }, { category: "self", summary: "SUSE Bug 1155689", url: "https://bugzilla.suse.com/1155689", }, { category: "self", summary: "SUSE Bug 1155692", url: "https://bugzilla.suse.com/1155692", }, { category: "self", summary: "SUSE Bug 1155836", url: "https://bugzilla.suse.com/1155836", }, { category: "self", summary: "SUSE Bug 1155897", url: "https://bugzilla.suse.com/1155897", }, { category: "self", summary: "SUSE Bug 1155982", url: "https://bugzilla.suse.com/1155982", }, { category: "self", summary: "SUSE Bug 1156187", url: "https://bugzilla.suse.com/1156187", }, { category: "self", summary: "SUSE Bug 1156258", url: "https://bugzilla.suse.com/1156258", }, { category: "self", summary: "SUSE Bug 1156429", url: "https://bugzilla.suse.com/1156429", }, { category: "self", summary: "SUSE Bug 1156466", url: "https://bugzilla.suse.com/1156466", }, { category: "self", summary: "SUSE Bug 1156471", url: "https://bugzilla.suse.com/1156471", }, { category: "self", summary: "SUSE Bug 1156494", url: "https://bugzilla.suse.com/1156494", }, { category: "self", summary: "SUSE Bug 1156609", url: "https://bugzilla.suse.com/1156609", }, { category: "self", summary: "SUSE Bug 1156700", url: "https://bugzilla.suse.com/1156700", }, { category: "self", summary: "SUSE Bug 1156729", url: "https://bugzilla.suse.com/1156729", }, { category: "self", summary: "SUSE Bug 1156882", url: "https://bugzilla.suse.com/1156882", }, { category: "self", summary: "SUSE Bug 1156928", url: "https://bugzilla.suse.com/1156928", }, { category: "self", summary: "SUSE Bug 1157032", url: "https://bugzilla.suse.com/1157032", }, { category: "self", summary: "SUSE Bug 1157038", url: "https://bugzilla.suse.com/1157038", }, { category: "self", summary: "SUSE Bug 1157044", url: "https://bugzilla.suse.com/1157044", }, { category: "self", summary: "SUSE Bug 1157045", url: "https://bugzilla.suse.com/1157045", }, { category: "self", summary: "SUSE Bug 1157046", url: "https://bugzilla.suse.com/1157046", }, { category: "self", summary: "SUSE Bug 1157049", url: "https://bugzilla.suse.com/1157049", }, { category: "self", summary: "SUSE Bug 1157070", url: "https://bugzilla.suse.com/1157070", }, { category: "self", summary: "SUSE Bug 1157115", url: "https://bugzilla.suse.com/1157115", }, { category: "self", summary: "SUSE Bug 1157143", url: "https://bugzilla.suse.com/1157143", }, { category: "self", summary: "SUSE Bug 1157145", url: "https://bugzilla.suse.com/1157145", }, { category: "self", summary: "SUSE Bug 1157158", url: "https://bugzilla.suse.com/1157158", }, { category: "self", summary: "SUSE Bug 1157160", url: "https://bugzilla.suse.com/1157160", }, { category: "self", summary: "SUSE Bug 1157162", url: "https://bugzilla.suse.com/1157162", }, { category: "self", summary: "SUSE Bug 1157173", url: "https://bugzilla.suse.com/1157173", }, { category: "self", summary: "SUSE Bug 1157178", url: "https://bugzilla.suse.com/1157178", }, { category: "self", summary: "SUSE Bug 1157180", url: "https://bugzilla.suse.com/1157180", }, { category: "self", summary: "SUSE Bug 1157182", url: "https://bugzilla.suse.com/1157182", }, { category: "self", summary: "SUSE Bug 1157183", url: "https://bugzilla.suse.com/1157183", }, { category: "self", summary: "SUSE Bug 1157184", url: "https://bugzilla.suse.com/1157184", }, { category: "self", summary: "SUSE Bug 1157191", url: "https://bugzilla.suse.com/1157191", }, { category: "self", summary: "SUSE Bug 1157193", url: "https://bugzilla.suse.com/1157193", }, { category: "self", summary: "SUSE Bug 1157197", url: "https://bugzilla.suse.com/1157197", }, { category: "self", summary: "SUSE Bug 1157298", url: "https://bugzilla.suse.com/1157298", }, { category: "self", summary: "SUSE Bug 1157304", url: "https://bugzilla.suse.com/1157304", }, { category: "self", summary: "SUSE Bug 1157307", url: "https://bugzilla.suse.com/1157307", }, { category: "self", summary: "SUSE Bug 1157324", url: "https://bugzilla.suse.com/1157324", }, { category: "self", summary: "SUSE Bug 1157333", url: "https://bugzilla.suse.com/1157333", }, { category: "self", summary: "SUSE Bug 1157386", url: "https://bugzilla.suse.com/1157386", }, { category: "self", summary: "SUSE Bug 1157424", url: "https://bugzilla.suse.com/1157424", }, { category: "self", summary: "SUSE Bug 1157463", url: "https://bugzilla.suse.com/1157463", }, { category: "self", summary: "SUSE Bug 1157499", url: "https://bugzilla.suse.com/1157499", }, { category: "self", summary: "SUSE Bug 1157678", url: "https://bugzilla.suse.com/1157678", }, { category: "self", summary: "SUSE Bug 1157698", url: "https://bugzilla.suse.com/1157698", }, { category: "self", summary: "SUSE Bug 1157778", url: "https://bugzilla.suse.com/1157778", }, { category: "self", summary: "SUSE Bug 1157908", url: "https://bugzilla.suse.com/1157908", }, { category: "self", summary: "SUSE Bug 1158049", url: "https://bugzilla.suse.com/1158049", }, { category: "self", summary: "SUSE Bug 1158063", url: "https://bugzilla.suse.com/1158063", }, { category: "self", summary: "SUSE Bug 1158064", url: "https://bugzilla.suse.com/1158064", }, { category: "self", summary: "SUSE Bug 1158065", url: "https://bugzilla.suse.com/1158065", }, { category: "self", summary: "SUSE Bug 1158066", url: "https://bugzilla.suse.com/1158066", }, { category: "self", summary: "SUSE Bug 1158067", url: "https://bugzilla.suse.com/1158067", }, { category: "self", summary: "SUSE Bug 1158068", url: "https://bugzilla.suse.com/1158068", }, { category: "self", summary: "SUSE CVE CVE-2017-18595 page", url: "https://www.suse.com/security/cve/CVE-2017-18595/", }, { category: "self", summary: "SUSE CVE CVE-2019-0154 page", url: "https://www.suse.com/security/cve/CVE-2019-0154/", }, { category: "self", summary: "SUSE CVE CVE-2019-0155 page", url: "https://www.suse.com/security/cve/CVE-2019-0155/", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-11135 page", url: "https://www.suse.com/security/cve/CVE-2019-11135/", }, { category: "self", summary: "SUSE CVE CVE-2019-14821 page", url: "https://www.suse.com/security/cve/CVE-2019-14821/", }, { category: "self", summary: "SUSE CVE CVE-2019-14835 page", url: "https://www.suse.com/security/cve/CVE-2019-14835/", }, { category: "self", summary: "SUSE CVE CVE-2019-14895 page", url: "https://www.suse.com/security/cve/CVE-2019-14895/", }, { category: "self", summary: "SUSE CVE CVE-2019-15030 page", url: "https://www.suse.com/security/cve/CVE-2019-15030/", }, { category: "self", summary: "SUSE CVE CVE-2019-15031 page", url: "https://www.suse.com/security/cve/CVE-2019-15031/", }, { category: "self", summary: "SUSE CVE CVE-2019-15916 page", url: "https://www.suse.com/security/cve/CVE-2019-15916/", }, { category: "self", summary: "SUSE CVE CVE-2019-16231 page", url: "https://www.suse.com/security/cve/CVE-2019-16231/", }, { category: "self", summary: "SUSE CVE CVE-2019-16233 page", url: "https://www.suse.com/security/cve/CVE-2019-16233/", }, { category: "self", summary: "SUSE CVE CVE-2019-16995 page", url: "https://www.suse.com/security/cve/CVE-2019-16995/", }, { category: "self", summary: "SUSE CVE CVE-2019-17055 page", url: "https://www.suse.com/security/cve/CVE-2019-17055/", }, { category: "self", summary: "SUSE CVE CVE-2019-17056 page", url: "https://www.suse.com/security/cve/CVE-2019-17056/", }, { category: "self", summary: "SUSE CVE CVE-2019-17666 page", url: "https://www.suse.com/security/cve/CVE-2019-17666/", }, { category: "self", summary: "SUSE CVE CVE-2019-18660 page", url: "https://www.suse.com/security/cve/CVE-2019-18660/", }, { category: "self", summary: "SUSE CVE CVE-2019-18683 page", url: "https://www.suse.com/security/cve/CVE-2019-18683/", }, { category: "self", summary: "SUSE CVE CVE-2019-18805 page", url: "https://www.suse.com/security/cve/CVE-2019-18805/", }, { category: "self", summary: "SUSE CVE CVE-2019-18809 page", url: "https://www.suse.com/security/cve/CVE-2019-18809/", }, { category: "self", summary: "SUSE CVE CVE-2019-19046 page", url: "https://www.suse.com/security/cve/CVE-2019-19046/", }, { category: "self", summary: "SUSE CVE CVE-2019-19049 page", url: "https://www.suse.com/security/cve/CVE-2019-19049/", }, { category: "self", summary: "SUSE CVE CVE-2019-19052 page", url: "https://www.suse.com/security/cve/CVE-2019-19052/", }, { category: "self", summary: "SUSE CVE CVE-2019-19056 page", url: "https://www.suse.com/security/cve/CVE-2019-19056/", }, { category: "self", summary: "SUSE CVE CVE-2019-19057 page", url: "https://www.suse.com/security/cve/CVE-2019-19057/", }, { category: "self", summary: "SUSE CVE CVE-2019-19058 page", url: "https://www.suse.com/security/cve/CVE-2019-19058/", }, { category: "self", summary: "SUSE CVE CVE-2019-19060 page", url: "https://www.suse.com/security/cve/CVE-2019-19060/", }, { category: "self", summary: "SUSE CVE CVE-2019-19062 page", url: "https://www.suse.com/security/cve/CVE-2019-19062/", }, { category: "self", summary: "SUSE CVE CVE-2019-19063 page", url: "https://www.suse.com/security/cve/CVE-2019-19063/", }, { category: "self", summary: "SUSE CVE CVE-2019-19065 page", url: "https://www.suse.com/security/cve/CVE-2019-19065/", }, { category: "self", summary: "SUSE CVE CVE-2019-19067 page", url: "https://www.suse.com/security/cve/CVE-2019-19067/", }, { category: "self", summary: "SUSE CVE CVE-2019-19068 page", url: "https://www.suse.com/security/cve/CVE-2019-19068/", }, { category: "self", summary: "SUSE CVE CVE-2019-19073 page", url: "https://www.suse.com/security/cve/CVE-2019-19073/", }, { category: "self", summary: "SUSE CVE CVE-2019-19074 page", url: "https://www.suse.com/security/cve/CVE-2019-19074/", }, { category: "self", summary: "SUSE CVE CVE-2019-19075 page", url: "https://www.suse.com/security/cve/CVE-2019-19075/", }, { category: "self", summary: "SUSE CVE CVE-2019-19078 page", url: "https://www.suse.com/security/cve/CVE-2019-19078/", }, { category: "self", summary: "SUSE CVE CVE-2019-19080 page", url: "https://www.suse.com/security/cve/CVE-2019-19080/", }, { category: "self", summary: "SUSE CVE CVE-2019-19081 page", url: "https://www.suse.com/security/cve/CVE-2019-19081/", }, { category: "self", summary: "SUSE CVE CVE-2019-19082 page", url: "https://www.suse.com/security/cve/CVE-2019-19082/", }, { category: "self", summary: "SUSE CVE CVE-2019-19083 page", url: "https://www.suse.com/security/cve/CVE-2019-19083/", }, { category: "self", summary: "SUSE CVE CVE-2019-19227 page", url: "https://www.suse.com/security/cve/CVE-2019-19227/", }, { category: "self", summary: "SUSE CVE CVE-2019-9456 page", url: "https://www.suse.com/security/cve/CVE-2019-9456/", }, { category: "self", summary: "SUSE CVE CVE-2019-9506 page", url: "https://www.suse.com/security/cve/CVE-2019-9506/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-12-06T18:11:23Z", generator: { date: "2019-12-06T18:11:23Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3200-1", initial_release_date: "2019-12-06T18:11:23Z", revision_history: [ { date: "2019-12-06T18:11:23Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.7.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-122.7.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.7.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-122.7.1.aarch64", product_id: "dlm-kmp-default-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.7.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-122.7.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.7.1.aarch64", product: { name: "kernel-default-4.12.14-122.7.1.aarch64", product_id: "kernel-default-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.7.1.aarch64", product: { name: "kernel-default-base-4.12.14-122.7.1.aarch64", product_id: "kernel-default-base-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.7.1.aarch64", product: { name: "kernel-default-devel-4.12.14-122.7.1.aarch64", product_id: "kernel-default-devel-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.7.1.aarch64", product: { name: "kernel-default-extra-4.12.14-122.7.1.aarch64", product_id: "kernel-default-extra-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.7.1.aarch64", product: { name: "kernel-default-kgraft-4.12.14-122.7.1.aarch64", product_id: "kernel-default-kgraft-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.7.1.aarch64", product: { name: "kernel-default-kgraft-devel-4.12.14-122.7.1.aarch64", product_id: "kernel-default-kgraft-devel-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.7.1.aarch64", product: { name: "kernel-obs-build-4.12.14-122.7.1.aarch64", product_id: "kernel-obs-build-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.7.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-122.7.1.aarch64", product_id: "kernel-obs-qa-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.7.1.aarch64", product: { name: "kernel-syms-4.12.14-122.7.1.aarch64", product_id: "kernel-syms-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.7.1.aarch64", product: { name: "kernel-vanilla-4.12.14-122.7.1.aarch64", product_id: "kernel-vanilla-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.7.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-122.7.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.7.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-122.7.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.7.1.aarch64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.7.1.aarch64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.7.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-122.7.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-122.7.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.7.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-122.7.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-122.7.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-122.7.1.noarch", product: { name: "kernel-devel-4.12.14-122.7.1.noarch", product_id: "kernel-devel-4.12.14-122.7.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-122.7.1.noarch", product: { name: "kernel-docs-4.12.14-122.7.1.noarch", product_id: "kernel-docs-4.12.14-122.7.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-122.7.1.noarch", product: { name: "kernel-docs-html-4.12.14-122.7.1.noarch", product_id: "kernel-docs-html-4.12.14-122.7.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-122.7.1.noarch", product: { name: "kernel-macros-4.12.14-122.7.1.noarch", product_id: "kernel-macros-4.12.14-122.7.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-122.7.1.noarch", product: { name: "kernel-source-4.12.14-122.7.1.noarch", product_id: "kernel-source-4.12.14-122.7.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-122.7.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-122.7.1.noarch", product_id: "kernel-source-vanilla-4.12.14-122.7.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.7.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-122.7.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.7.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-122.7.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-122.7.1.ppc64le", product: { name: "kernel-debug-4.12.14-122.7.1.ppc64le", product_id: "kernel-debug-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-122.7.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-122.7.1.ppc64le", product_id: "kernel-debug-base-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-122.7.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-122.7.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-122.7.1.ppc64le", product: { name: "kernel-debug-kgraft-devel-4.12.14-122.7.1.ppc64le", product_id: "kernel-debug-kgraft-devel-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.7.1.ppc64le", product: { name: "kernel-default-4.12.14-122.7.1.ppc64le", product_id: "kernel-default-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.7.1.ppc64le", product: { name: "kernel-default-base-4.12.14-122.7.1.ppc64le", product_id: "kernel-default-base-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.7.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-122.7.1.ppc64le", product_id: "kernel-default-devel-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.7.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-122.7.1.ppc64le", product_id: "kernel-default-extra-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.7.1.ppc64le", product: { name: "kernel-default-kgraft-4.12.14-122.7.1.ppc64le", product_id: "kernel-default-kgraft-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", product: { name: "kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", product_id: "kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.7.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-122.7.1.ppc64le", product_id: "kernel-obs-build-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.7.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-122.7.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.7.1.ppc64le", product: { name: "kernel-syms-4.12.14-122.7.1.ppc64le", product_id: "kernel-syms-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.7.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-122.7.1.ppc64le", product_id: "kernel-vanilla-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.7.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-122.7.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.7.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-122.7.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.7.1.ppc64le", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.7.1.ppc64le", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", product: { name: "kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", product_id: "kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.7.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-122.7.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-122.7.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.7.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-122.7.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.7.1.s390x", product: { name: "dlm-kmp-default-4.12.14-122.7.1.s390x", product_id: "dlm-kmp-default-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.7.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-122.7.1.s390x", product_id: "gfs2-kmp-default-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.7.1.s390x", product: { name: "kernel-default-4.12.14-122.7.1.s390x", product_id: "kernel-default-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.7.1.s390x", product: { name: "kernel-default-base-4.12.14-122.7.1.s390x", product_id: "kernel-default-base-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.7.1.s390x", product: { name: "kernel-default-devel-4.12.14-122.7.1.s390x", product_id: "kernel-default-devel-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.7.1.s390x", product: { name: "kernel-default-extra-4.12.14-122.7.1.s390x", product_id: "kernel-default-extra-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.7.1.s390x", product: { name: "kernel-default-kgraft-4.12.14-122.7.1.s390x", product_id: "kernel-default-kgraft-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.7.1.s390x", product: { name: "kernel-default-kgraft-devel-4.12.14-122.7.1.s390x", product_id: "kernel-default-kgraft-devel-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-122.7.1.s390x", product: { name: "kernel-default-man-4.12.14-122.7.1.s390x", product_id: "kernel-default-man-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.7.1.s390x", product: { name: "kernel-obs-build-4.12.14-122.7.1.s390x", product_id: "kernel-obs-build-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.7.1.s390x", product: { name: "kernel-obs-qa-4.12.14-122.7.1.s390x", product_id: "kernel-obs-qa-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.7.1.s390x", product: { name: "kernel-syms-4.12.14-122.7.1.s390x", product_id: "kernel-syms-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.7.1.s390x", product: { name: "kernel-vanilla-4.12.14-122.7.1.s390x", product_id: "kernel-vanilla-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.7.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-122.7.1.s390x", product_id: "kernel-vanilla-base-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.7.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-122.7.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.7.1.s390x", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.7.1.s390x", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-122.7.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-122.7.1.s390x", product_id: "kernel-zfcpdump-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-122.7.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-122.7.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.7.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-122.7.1.s390x", product_id: "kselftests-kmp-default-4.12.14-122.7.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.7.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-122.7.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-122.7.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.7.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-122.7.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.7.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-122.7.1.x86_64", product_id: "dlm-kmp-default-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.7.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-122.7.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-122.7.1.x86_64", product: { name: "kernel-debug-4.12.14-122.7.1.x86_64", product_id: "kernel-debug-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-122.7.1.x86_64", product: { name: "kernel-debug-base-4.12.14-122.7.1.x86_64", product_id: "kernel-debug-base-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-122.7.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-122.7.1.x86_64", product_id: "kernel-debug-devel-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-122.7.1.x86_64", product: { name: "kernel-debug-kgraft-devel-4.12.14-122.7.1.x86_64", product_id: "kernel-debug-kgraft-devel-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.7.1.x86_64", product: { name: "kernel-default-4.12.14-122.7.1.x86_64", product_id: "kernel-default-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.7.1.x86_64", product: { name: "kernel-default-base-4.12.14-122.7.1.x86_64", product_id: "kernel-default-base-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.7.1.x86_64", product: { name: "kernel-default-devel-4.12.14-122.7.1.x86_64", product_id: "kernel-default-devel-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.7.1.x86_64", product: { name: "kernel-default-extra-4.12.14-122.7.1.x86_64", product_id: "kernel-default-extra-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.7.1.x86_64", product: { name: "kernel-default-kgraft-4.12.14-122.7.1.x86_64", product_id: "kernel-default-kgraft-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", product: { name: "kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", product_id: "kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-122.7.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-122.7.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-122.7.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-122.7.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-122.7.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-122.7.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-kgraft-devel-4.12.14-122.7.1.x86_64", product: { name: "kernel-kvmsmall-kgraft-devel-4.12.14-122.7.1.x86_64", product_id: "kernel-kvmsmall-kgraft-devel-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.7.1.x86_64", product: { name: "kernel-obs-build-4.12.14-122.7.1.x86_64", product_id: "kernel-obs-build-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.7.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-122.7.1.x86_64", product_id: "kernel-obs-qa-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.7.1.x86_64", product: { name: "kernel-syms-4.12.14-122.7.1.x86_64", product_id: "kernel-syms-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.7.1.x86_64", product: { name: "kernel-vanilla-4.12.14-122.7.1.x86_64", product_id: "kernel-vanilla-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.7.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-122.7.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.7.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-122.7.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.7.1.x86_64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.7.1.x86_64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", product: { name: "kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", product_id: "kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.7.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-122.7.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-122.7.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.7.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-122.7.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-122.7.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP5", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP5", product: { name: "SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP5", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", }, product_reference: "kernel-default-kgraft-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", }, product_reference: "kernel-default-kgraft-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", }, product_reference: "kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", }, product_reference: "kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-122.7.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", }, product_reference: "kernel-docs-4.12.14-122.7.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.7.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-122.7.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", }, product_reference: "kernel-default-4.12.14-122.7.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", }, product_reference: "kernel-default-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", }, product_reference: "kernel-default-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", }, product_reference: "kernel-default-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-122.7.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", }, product_reference: "kernel-default-base-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-122.7.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", }, product_reference: "kernel-default-man-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-122.7.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", }, product_reference: "kernel-devel-4.12.14-122.7.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-122.7.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", }, product_reference: "kernel-macros-4.12.14-122.7.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-122.7.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", }, product_reference: "kernel-source-4.12.14-122.7.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", }, product_reference: "kernel-syms-4.12.14-122.7.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", }, product_reference: "kernel-syms-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", }, product_reference: "kernel-syms-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.7.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", }, product_reference: "kernel-default-4.12.14-122.7.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", }, product_reference: "kernel-default-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", }, product_reference: "kernel-default-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", }, product_reference: "kernel-default-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.7.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-122.7.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", }, product_reference: "kernel-default-base-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.7.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-122.7.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", }, product_reference: "kernel-default-man-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-122.7.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", }, product_reference: "kernel-devel-4.12.14-122.7.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-122.7.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", }, product_reference: "kernel-macros-4.12.14-122.7.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-122.7.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", }, product_reference: "kernel-source-4.12.14-122.7.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.7.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", }, product_reference: "kernel-syms-4.12.14-122.7.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-122.7.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", }, product_reference: "kernel-syms-4.12.14-122.7.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", }, product_reference: "kernel-syms-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-122.7.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", }, product_reference: "kernel-default-extra-4.12.14-122.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2017-18595", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18595", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18595", url: "https://www.suse.com/security/cve/CVE-2017-18595", }, { category: "external", summary: "SUSE Bug 1149555 for CVE-2017-18595", url: "https://bugzilla.suse.com/1149555", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2017-18595", }, { cve: "CVE-2019-0154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0154", }, ], notes: [ { category: "general", text: "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0154", url: "https://www.suse.com/security/cve/CVE-2019-0154", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0154", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2019-0154", url: "https://bugzilla.suse.com/1181720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "important", }, ], title: "CVE-2019-0154", }, { cve: "CVE-2019-0155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0155", }, ], notes: [ { category: "general", text: "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0155", url: "https://www.suse.com/security/cve/CVE-2019-0155", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0155", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1135967 for CVE-2019-0155", url: "https://bugzilla.suse.com/1135967", }, { category: "external", summary: "SUSE Bug 1173663 for CVE-2019-0155", url: "https://bugzilla.suse.com/1173663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "important", }, ], title: "CVE-2019-0155", }, { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-11135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11135", }, ], notes: [ { category: "general", text: "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11135", url: "https://www.suse.com/security/cve/CVE-2019-11135", }, { category: "external", summary: "SUSE Bug 1139073 for CVE-2019-11135", url: "https://bugzilla.suse.com/1139073", }, { category: "external", summary: "SUSE Bug 1152497 for CVE-2019-11135", url: "https://bugzilla.suse.com/1152497", }, { category: "external", summary: "SUSE Bug 1152505 for CVE-2019-11135", url: "https://bugzilla.suse.com/1152505", }, { category: "external", summary: "SUSE Bug 1152506 for CVE-2019-11135", url: "https://bugzilla.suse.com/1152506", }, { category: "external", summary: "SUSE Bug 1160120 for CVE-2019-11135", url: "https://bugzilla.suse.com/1160120", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2019-11135", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-11135", }, { cve: "CVE-2019-14821", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14821", }, ], notes: [ { category: "general", text: "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14821", url: "https://www.suse.com/security/cve/CVE-2019-14821", }, { category: "external", summary: "SUSE Bug 1151350 for CVE-2019-14821", url: "https://bugzilla.suse.com/1151350", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2019-14821", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-14821", }, { cve: "CVE-2019-14835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14835", }, ], notes: [ { category: "general", text: "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14835", url: "https://www.suse.com/security/cve/CVE-2019-14835", }, { category: "external", summary: "SUSE Bug 1150112 for CVE-2019-14835", url: "https://bugzilla.suse.com/1150112", }, { category: "external", summary: "SUSE Bug 1151021 for CVE-2019-14835", url: "https://bugzilla.suse.com/1151021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "important", }, ], title: "CVE-2019-14835", }, { cve: "CVE-2019-14895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14895", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14895", url: "https://www.suse.com/security/cve/CVE-2019-14895", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1157158 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157158", }, { category: "external", summary: "SUSE Bug 1173100 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173100", }, { category: "external", summary: "SUSE Bug 1173660 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "important", }, ], title: "CVE-2019-14895", }, { cve: "CVE-2019-15030", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15030", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15030", url: "https://www.suse.com/security/cve/CVE-2019-15030", }, { category: "external", summary: "SUSE Bug 1149713 for CVE-2019-15030", url: "https://bugzilla.suse.com/1149713", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-15030", }, { cve: "CVE-2019-15031", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15031", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15031", url: "https://www.suse.com/security/cve/CVE-2019-15031", }, { category: "external", summary: "SUSE Bug 1149713 for CVE-2019-15031", url: "https://bugzilla.suse.com/1149713", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-15031", }, { cve: "CVE-2019-15916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15916", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15916", url: "https://www.suse.com/security/cve/CVE-2019-15916", }, { category: "external", summary: "SUSE Bug 1149448 for CVE-2019-15916", url: "https://bugzilla.suse.com/1149448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "low", }, ], title: "CVE-2019-15916", }, { cve: "CVE-2019-16231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16231", }, ], notes: [ { category: "general", text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16231", url: "https://www.suse.com/security/cve/CVE-2019-16231", }, { category: "external", summary: "SUSE Bug 1150466 for CVE-2019-16231", url: "https://bugzilla.suse.com/1150466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "low", }, ], title: "CVE-2019-16231", }, { cve: "CVE-2019-16233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16233", }, ], notes: [ { category: "general", text: "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16233", url: "https://www.suse.com/security/cve/CVE-2019-16233", }, { category: "external", summary: "SUSE Bug 1150457 for CVE-2019-16233", url: "https://bugzilla.suse.com/1150457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "low", }, ], title: "CVE-2019-16233", }, { cve: "CVE-2019-16995", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16995", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16995", url: "https://www.suse.com/security/cve/CVE-2019-16995", }, { category: "external", summary: "SUSE Bug 1152685 for CVE-2019-16995", url: "https://bugzilla.suse.com/1152685", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-16995", }, { cve: "CVE-2019-17055", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17055", }, ], notes: [ { category: "general", text: "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17055", url: "https://www.suse.com/security/cve/CVE-2019-17055", }, { category: "external", summary: "SUSE Bug 1152782 for CVE-2019-17055", url: "https://bugzilla.suse.com/1152782", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "low", }, ], title: "CVE-2019-17055", }, { cve: "CVE-2019-17056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17056", }, ], notes: [ { category: "general", text: "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17056", url: "https://www.suse.com/security/cve/CVE-2019-17056", }, { category: "external", summary: "SUSE Bug 1152788 for CVE-2019-17056", url: "https://bugzilla.suse.com/1152788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-17056", }, { cve: "CVE-2019-17666", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17666", }, ], notes: [ { category: "general", text: "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17666", url: "https://www.suse.com/security/cve/CVE-2019-17666", }, { category: "external", summary: "SUSE Bug 1154372 for CVE-2019-17666", url: "https://bugzilla.suse.com/1154372", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-17666", }, { cve: "CVE-2019-18660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18660", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18660", url: "https://www.suse.com/security/cve/CVE-2019-18660", }, { category: "external", summary: "SUSE Bug 1157038 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157038", }, { category: "external", summary: "SUSE Bug 1157923 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-18660", }, { cve: "CVE-2019-18683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18683", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18683", url: "https://www.suse.com/security/cve/CVE-2019-18683", }, { category: "external", summary: "SUSE Bug 1155897 for CVE-2019-18683", url: "https://bugzilla.suse.com/1155897", }, { category: "external", summary: "SUSE Bug 1173868 for CVE-2019-18683", url: "https://bugzilla.suse.com/1173868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-18683", }, { cve: "CVE-2019-18805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18805", }, ], notes: [ { category: "general", text: "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18805", url: "https://www.suse.com/security/cve/CVE-2019-18805", }, { category: "external", summary: "SUSE Bug 1156187 for CVE-2019-18805", url: "https://bugzilla.suse.com/1156187", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "low", }, ], title: "CVE-2019-18805", }, { cve: "CVE-2019-18809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18809", }, ], notes: [ { category: "general", text: "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18809", url: "https://www.suse.com/security/cve/CVE-2019-18809", }, { category: "external", summary: "SUSE Bug 1156258 for CVE-2019-18809", url: "https://bugzilla.suse.com/1156258", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-18809", }, { cve: "CVE-2019-19046", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19046", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19046", url: "https://www.suse.com/security/cve/CVE-2019-19046", }, { category: "external", summary: "SUSE Bug 1157304 for CVE-2019-19046", url: "https://bugzilla.suse.com/1157304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19046", }, { cve: "CVE-2019-19049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19049", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19049", url: "https://www.suse.com/security/cve/CVE-2019-19049", }, { category: "external", summary: "SUSE Bug 1157173 for CVE-2019-19049", url: "https://bugzilla.suse.com/1157173", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19049", }, { cve: "CVE-2019-19052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19052", }, ], notes: [ { category: "general", text: "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19052", url: "https://www.suse.com/security/cve/CVE-2019-19052", }, { category: "external", summary: "SUSE Bug 1157324 for CVE-2019-19052", url: "https://bugzilla.suse.com/1157324", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19052", }, { cve: "CVE-2019-19056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19056", }, ], notes: [ { category: "general", text: "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19056", url: "https://www.suse.com/security/cve/CVE-2019-19056", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19056", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19057", }, ], notes: [ { category: "general", text: "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19057", url: "https://www.suse.com/security/cve/CVE-2019-19057", }, { category: "external", summary: "SUSE Bug 1157193 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157193", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "low", }, ], title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19058", }, ], notes: [ { category: "general", text: "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19058", url: "https://www.suse.com/security/cve/CVE-2019-19058", }, { category: "external", summary: "SUSE Bug 1157145 for CVE-2019-19058", url: "https://bugzilla.suse.com/1157145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19058", }, { cve: "CVE-2019-19060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19060", }, ], notes: [ { category: "general", text: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19060", url: "https://www.suse.com/security/cve/CVE-2019-19060", }, { category: "external", summary: "SUSE Bug 1157178 for CVE-2019-19060", url: "https://bugzilla.suse.com/1157178", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19060", }, { cve: "CVE-2019-19062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19062", }, ], notes: [ { category: "general", text: "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19062", url: "https://www.suse.com/security/cve/CVE-2019-19062", }, { category: "external", summary: "SUSE Bug 1157333 for CVE-2019-19062", url: "https://bugzilla.suse.com/1157333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19063", }, ], notes: [ { category: "general", text: "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19063", url: "https://www.suse.com/security/cve/CVE-2019-19063", }, { category: "external", summary: "SUSE Bug 1157298 for CVE-2019-19063", url: "https://bugzilla.suse.com/1157298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19063", }, { cve: "CVE-2019-19065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19065", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19065", url: "https://www.suse.com/security/cve/CVE-2019-19065", }, { category: "external", summary: "SUSE Bug 1157191 for CVE-2019-19065", url: "https://bugzilla.suse.com/1157191", }, { category: "external", summary: "SUSE Bug 1173961 for CVE-2019-19065", url: "https://bugzilla.suse.com/1173961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "important", }, ], title: "CVE-2019-19065", }, { cve: "CVE-2019-19067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19067", }, ], notes: [ { category: "general", text: "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19067", url: "https://www.suse.com/security/cve/CVE-2019-19067", }, { category: "external", summary: "SUSE Bug 1157180 for CVE-2019-19067", url: "https://bugzilla.suse.com/1157180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19068", }, ], notes: [ { category: "general", text: "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19068", url: "https://www.suse.com/security/cve/CVE-2019-19068", }, { category: "external", summary: "SUSE Bug 1157307 for CVE-2019-19068", url: "https://bugzilla.suse.com/1157307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19068", }, { cve: "CVE-2019-19073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19073", }, ], notes: [ { category: "general", text: "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19073", url: "https://www.suse.com/security/cve/CVE-2019-19073", }, { category: "external", summary: "SUSE Bug 1157070 for CVE-2019-19073", url: "https://bugzilla.suse.com/1157070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19074", }, ], notes: [ { category: "general", text: "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19074", url: "https://www.suse.com/security/cve/CVE-2019-19074", }, { category: "external", summary: "SUSE Bug 1157143 for CVE-2019-19074", url: "https://bugzilla.suse.com/1157143", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19075", }, ], notes: [ { category: "general", text: "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19075", url: "https://www.suse.com/security/cve/CVE-2019-19075", }, { category: "external", summary: "SUSE Bug 1157162 for CVE-2019-19075", url: "https://bugzilla.suse.com/1157162", }, { category: "external", summary: "SUSE Bug 1173958 for CVE-2019-19075", url: "https://bugzilla.suse.com/1173958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "low", }, ], title: "CVE-2019-19075", }, { cve: "CVE-2019-19078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19078", }, ], notes: [ { category: "general", text: "A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19078", url: "https://www.suse.com/security/cve/CVE-2019-19078", }, { category: "external", summary: "SUSE Bug 1157032 for CVE-2019-19078", url: "https://bugzilla.suse.com/1157032", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19078", }, { cve: "CVE-2019-19080", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19080", }, ], notes: [ { category: "general", text: "Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19080", url: "https://www.suse.com/security/cve/CVE-2019-19080", }, { category: "external", summary: "SUSE Bug 1157044 for CVE-2019-19080", url: "https://bugzilla.suse.com/1157044", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19080", }, { cve: "CVE-2019-19081", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19081", }, ], notes: [ { category: "general", text: "A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19081", url: "https://www.suse.com/security/cve/CVE-2019-19081", }, { category: "external", summary: "SUSE Bug 1157045 for CVE-2019-19081", url: "https://bugzilla.suse.com/1157045", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19081", }, { cve: "CVE-2019-19082", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19082", }, ], notes: [ { category: "general", text: "Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19082", url: "https://www.suse.com/security/cve/CVE-2019-19082", }, { category: "external", summary: "SUSE Bug 1157046 for CVE-2019-19082", url: "https://bugzilla.suse.com/1157046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19082", }, { cve: "CVE-2019-19083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19083", }, ], notes: [ { category: "general", text: "Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19083", url: "https://www.suse.com/security/cve/CVE-2019-19083", }, { category: "external", summary: "SUSE Bug 1157049 for CVE-2019-19083", url: "https://bugzilla.suse.com/1157049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19083", }, { cve: "CVE-2019-19227", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19227", }, ], notes: [ { category: "general", text: "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19227", url: "https://www.suse.com/security/cve/CVE-2019-19227", }, { category: "external", summary: "SUSE Bug 1157678 for CVE-2019-19227", url: "https://bugzilla.suse.com/1157678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-19227", }, { cve: "CVE-2019-9456", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9456", }, ], notes: [ { category: "general", text: "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9456", url: "https://www.suse.com/security/cve/CVE-2019-9456", }, { category: "external", summary: "SUSE Bug 1150025 for CVE-2019-9456", url: "https://bugzilla.suse.com/1150025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-9456", }, { cve: "CVE-2019-9506", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9506", }, ], notes: [ { category: "general", text: "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9506", url: "https://www.suse.com/security/cve/CVE-2019-9506", }, { category: "external", summary: "SUSE Bug 1137865 for CVE-2019-9506", url: "https://bugzilla.suse.com/1137865", }, { category: "external", summary: "SUSE Bug 1146042 for CVE-2019-9506", url: "https://bugzilla.suse.com/1146042", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-1-8.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.7.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.7.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-06T18:11:23Z", details: "moderate", }, ], title: "CVE-2019-9506", }, ], }
suse-su-2019:3317-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).\n- CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).\n- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).\n- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).\n- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).\n- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).\n- CVE-2019-19528: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (bnc#1158407).\n- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).\n- CVE-2019-19529: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver (bnc#1158381).\n- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).\n- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).\n- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).\n- CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1156258).\n- CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure (bnc#1157304).\n- CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157032).\n- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).\n- CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157307).\n- CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157298).\n- CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel there was a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client (bnc#1157678).\n- CVE-2019-19081: A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157045).\n- CVE-2019-19080: Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157044).\n- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).\n- CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering copy to udata failures (bnc#1157171).\n- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).\n- CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures (bsc#1157180).\n- CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157178).\n- CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures (bsc#1157173).\n- CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures (bnc#1157162).\n- CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures (bnc#1157145).\n- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).\n- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function (bnc#1157070).\n- CVE-2019-19083: Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel allowed attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c (bnc#1157049).\n- CVE-2019-19082: Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel allowed attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c (bnc#1157046).\n- CVE-2019-15916: An issue was discovered in the Linux kernel There was a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service (bnc#1149448).\n- CVE-2019-0154: Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1135966).\n- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).\n- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).\n- CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket (bnc#1152782).\n\nThe following non-security bugs were fixed:\n\n- bnxt_en: Update firmware interface spec. to 1.10.0.47 (bsc#1157115)\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n- ACPI / hotplug / PCI: Allocate resources directly under the non-hotplug bridge (bsc#1111666).\n- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n- ALSA: 6fire: Drop the dead code (git-fixes).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- ALSA: hda/hdmi - Clear codec->relaxed_resume flag at unbinding (git-fixes).\n- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n- ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC (git-fixes).\n- ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop (git-fixes).\n- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n- ALSA: hda: Fix racy display power access (bsc#1156928).\n- ALSA: hda: hdmi - fix port numbering for ICL and TGL platforms (git-fixes).\n- ALSA: hda: hdmi - remove redundant code comments (git-fixes).\n- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n- ALSA: pcm: Yet another missing check of non-cached buffer type (bsc#1111666).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: usb-audio: Add skip_validation option (git-fixes).\n- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n- ALSA: usb-audio: Fix NULL dereference at parsing BADD (git-fixes).\n- ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk() (git-fixes).\n- ALSA: usb-audio: Fix incorrect size check for processing/extension units (git-fixes).\n- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n- ALSA: usb-audio: sound: usb: usb true/false for bool return type (git-fixes).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n- Bluetooth: delete a stray unlock (bsc#1051510).\n- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n- Btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n- CIFS: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n- CIFS: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n- CIFS: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n- CIFS: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n- CIFS: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n- CIFS: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n- CIFS: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n- CIFS: fix max ea value size (bsc#1144333, bsc#1154355).\n- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n- HID: Fix assumption that devices have inputs (git-fixes).\n- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- IB/mlx5: Free mpi in mp_slave mode (bsc#1103991).\n- IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command (bsc#1103991).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n- KVM: s390: fix __insn32_query() inline assembly (git-fixes).\n- KVM: s390: vsie: Do not shadow CRYCB when no AP and no keys (git-fixes).\n- KVM: s390: vsie: Return correct values for Invalid CRYCB format (git-fixes).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).\n- NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n- PCI/PM: Clear PCIe PME Status even for legacy power management (bsc#1111666).\n- PCI/PME: Fix possible use-after-free on remove (git-fixes).\n- PCI/PTM: Remove spurious 'd' from granularity message (bsc#1051510).\n- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n- PCI: pciehp: Do not disable interrupt twice on suspend (bsc#1111666).\n- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n- PCI: tegra: Enable Relaxed Ordering only for Tegra20 and Tegra30 (git-fixes).\n- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n- PM / devfreq: passive: fix compiler warning (bsc#1051510).\n- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n- RDMA/bnxt_re: Fix stat push into dma buffer on gen p5 devices (bsc#1157115)\n- RDMA/efa: Add Amazon EFA driver (jsc#SLE-4805)\n- RDMA/efa: Clear the admin command buffer prior to its submission (git-fixes) Patch was already picked through Amazon driver repo but was not marked with a Git-commit tag\n- RDMA/hns: Fix comparison of unsigned long variable 'end' with less than zero (bsc#1104427 bsc#1137236).\n- RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 ).\n- RDMA/restrack: Track driver QP types in resource tracker (jsc#SLE-4805)\n- Remove patches that reportedly cause regression (bsc#1155689 ltc#182047).\n- Revert 'drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)' This reverts commit 71e3a1b8d8cf73f711f3e4100aa51f68e631f94f.\n- Revert synaptics-rmi4 patch due to regression (bsc#1155982) Also blacklisting it\n- UAS: Revert commit 3ae62a42090f ('UAS: fix alignment of scatter/gather segments').\n- USB: chaoskey: fix error case of a timeout (git-fixes).\n- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- USB: ldusb: fix control-message timeout (bsc#1051510).\n- USB: ldusb: fix ring-buffer locking (bsc#1051510).\n- USB: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n- USB: serial: mos7720: fix remote wakeup (git-fixes).\n- USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n- USB: serial: mos7840: fix remote wakeup (git-fixes).\n- USB: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n- USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- USBIP: add config dependency for SGL_ALLOC (git-fixes).\n- acpi/nfit, device-dax: Identify differentiated memory with a unique numa-node (bsc#1158071).\n- appledisplay: fix error handling in the scheduled work (git-fixes).\n- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n- ata: ep93xx: Use proper enums for directions (bsc#1051510).\n- ath10k: Correct error handling of dma_map_single() (bsc#1111666).\n- ath10k: allocate small size dma memory in ath10k_pci_diag_write_mem (bsc#1111666).\n- ath10k: assign 'n_cipher_suites = 11' for WCN3990 to enable WPA3 (bsc#1111666).\n- ath10k: avoid possible memory access violation (bsc#1111666).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: fix vdev-start timeout on error (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: skip resetting rx filter for WCN3990 (bsc#1111666).\n- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- ath9k_hw: fix uninitialized variable data (bsc#1051510).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n- bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands (bsc#1104745).\n- bnxt_en: Update firmware interface spec. to 1.10.0.89 (bsc#1157115)\n- bnxt_en: Update firmware interface to 1.10.0.69 (bsc#1157115)\n- bpf: Fix use after free in subprog's jited symbol removal (bsc#1109837).\n- bpf: fix BTF limits (bsc#1109837).\n- bpf: fix BTF verification of enums (bsc#1109837).\n- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n- brcmfmac: fix wrong strnchr usage (bsc#1111666).\n- brcmfmac: increase buffer for obtaining firmware capabilities (bsc#1111666).\n- brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n- brcmsmac: Use kvmalloc() for ucode allocations (bsc#1111666).\n- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n- cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n- cfg80211: validate wmm rule when setting (bsc#1111666).\n- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n- cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).\n- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n- cpupower: Fix coredump on VMWare (bsc#1051510).\n- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n- crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127354 bsc#1127371).\n- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n- dlm: do not leak kernel pointer to userspace (bsc#1051510).\n- dlm: fix invalid free (bsc#1051510).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n- docs: move protection-keys.rst to the core-api book (bsc#1078248).\n- drm/amd/display: fix odm combine pipe reset (bsc#1111666).\n- drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported (bsc#1113956)\n- drm/amdgpu/powerplay/vega10: allow undervolting in p7 (bsc#1111666).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1111666).\n- drm/amdgpu: fix memory leak (bsc#1111666).\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/cml: Add second PCH ID for CMP (bsc#1111666).\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915/gvt: fix dropping obj reference twice (bsc#1111666).\n- drm/i915/ilk: Fix warning when reading emon_status with no output (bsc#1111666).\n- drm/i915/pmu: 'Frequency' is reported as accumulated cycles (bsc#1112178)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915: Do not dereference request if it may have been retired when (bsc#1142635)\n- drm/i915: Fix and improve MCR selection logic (bsc#1112178)\n- drm/i915: Lock the engine while dumping the active request (bsc#1142635)\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Reacquire priolist cache after dropping the engine lock (bsc#1129770)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Skip modeset for cdclk changes if possible (bsc#1156928).\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/msm/dpu: handle failures while initializing displays (bsc#1111666).\n- drm/msm: fix memleak on release (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- drm: fix module name in edid_firmware log message (bsc#1113956)\n- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n- e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n- fix SCTP regression (bsc#1158082).\n- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n- hypfs: Fix error number left in struct pointer member (bsc#1051510).\n- i2c: of: Try to find an I2C adapter matching the parent (bsc#1129770)\n- i40e: enable X710 support (bsc#1151067).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ice: fix potential infinite loop because loop counter being too small (bsc#1118661).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n- intel_th: Fix a double put_device() in error path (git-fixes).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).\n- irqdomain: Add the missing assignment of domain->fwnode for named fwnode (bsc#1111666).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: check kasprintf() return value (bsc#1051510).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- iwlwifi: drop packets with bad status in CD (bsc#1111666).\n- iwlwifi: exclude GEO SAR support for 3168 (bsc#1111666).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- iwlwifi: fw: do not send GEO_TX_POWER_LIMIT command to FW version 36 (bsc#1111666).\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n- iwlwifi: mvm: use correct FIFO length (bsc#1111666).\n- iwlwifi: pcie: fit reclaim msg to MAX_MSG_LEN (bsc#1111666).\n- iwlwifi: pcie: read correct prph address for newer devices (bsc#1111666).\n- ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 ).\n- ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 ).\n- kABI fixup alloc_dax_region (bsc#1158071).\n- kABI workaround for ath10k hw_filter_reset_required field (bsc#1111666).\n- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for iwlwifi iwl_rx_cmd_buffer change (bsc#1111666).\n- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n- kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).\n- kabi protect enum RDMA_DRIVER_EFA (jsc#SLE-4805)\n- kabi: s390: struct subchannel (git-fixes).\n- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n- libnvdimm: Export the target_node attribute for regions and namespaces (bsc#1158071).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n- livepatch: Basic API to track system state changes (bsc#1071995 ).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n- loop: add ioctl for changing logical block size (bsc#1108043).\n- lpfc: size cpu map by last cpu id set (bsc#1157160).\n- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n- macvlan: schedule bc_work even if error (bsc#1051510).\n- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: bdisp: fix memleak on release (git-fixes).\n- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n- media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n- media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).\n- media: radio: wl1273: fix interrupt masking on release (git-fixes).\n- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n- media: vim2m: Fix abort issue (git-fixes).\n- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n- mei: fix modalias documentation (git-fixes).\n- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095) Fix badly backported patch\n- mlxsw: spectrum_flower: Fail in case user specifies multiple mirror actions (bsc#1112374).\n- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).\n- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n- mmc: core: fix wl1251 sdio quirks (git-fixes).\n- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdio: fix wl1251 vendor id (git-fixes).\n- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n- mt76x0: init hw capabilities.\n- mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n- mwifex: free rx_cmd skb in suspended state (bsc#1111666).\n- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n- mwifiex: do no submit URB in suspended state (bsc#1111666).\n- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n- net/mlx5: FWTrace, Reduce stack usage (bsc#1103990).\n- net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 ).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 ).\n- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n- net/mlx5e: Print a warning when LRO feature is dropped or not allowed (bsc#1103990).\n- net/sched: cbs: Fix not adding cbs instance to list (bsc#1109837).\n- net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate (bsc#1109837).\n- net/smc: Fix error path in smc_init (git-fixes).\n- net/smc: avoid fallback in case of non-blocking connect (git-fixes).\n- net/smc: do not schedule tx_work in SMC_CLOSED state (git-fixes).\n- net/smc: fix SMCD link group creation with VLAN id (git-fixes).\n- net/smc: fix closing of fallback SMC sockets (git-fixes).\n- net/smc: fix ethernet interface refcounting (git-fixes).\n- net/smc: fix fastopen for non-blocking connect() (git-fixes).\n- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).\n- net/smc: fix refcounting for non-blocking connect() (git-fixes).\n- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).\n- net/smc: original socket family in inet_sock_diag (git-fixes).\n- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).\n- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n- net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).\n- net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).\n- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n- net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).\n- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n- net: dsa: fix switch tree list (networking-stable-19_11_05).\n- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n- net: hns3: change GFP flag during lock period (bsc#1104353 ).\n- net: hns3: do not query unsupported commands in debugfs (bsc#1104353).\n- net: hns3: fix GFP flag error in hclge_mac_update_stats() (bsc#1126390).\n- net: hns3: fix some reset handshake issue (bsc#1104353 ).\n- net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353 bsc#1134983).\n- net: hns: Fix the stray netpoll locks causing deadlock in NAPI path (bsc#1104353).\n- net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 ).\n- net: phylink: Fix flow control resolution (bsc#1119113 ).\n- net: sched: cbs: Avoid division by zero when calculating the port rate (bsc#1109837).\n- net: sched: fix possible crash in tcf_action_destroy() (bsc#1109837).\n- net: sched: fix reordering issues (bsc#1109837).\n- net: sock_map, fix missing ulp check in sock hash case (bsc#1109837).\n- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n- nfc: netlink: fix double device reference drop (git-fixes).\n- nfc: port100: handle command failure cleanly (git-fixes).\n- nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs (bsc#1109837).\n- nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs (bsc#1109837).\n- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n- nvme-tcp: support C2HData with SUCCESS flag (bsc#1157386).\n- openvswitch: fix flow command message size (git-fixes).\n- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n- perf/x86/amd: Change/fix NMI latency mitigation to use a timestamp (bsc#1142924).\n- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n- phylink: fix kernel-doc warnings (bsc#1111666).\n- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).\n- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n- powerpc/bpf: Fix tail call implementation (bsc#1157698).\n- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n- printk: Export console_printk (bsc#1071995).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n- qxl: fix null-pointer crash during suspend (bsc#1111666).\n- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).\n- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n- rtlwifi: btcoex: Use proper enumerated types for Wi-Fi only interface (bsc#1111666).\n- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n- s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n- s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n- s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n- s390/cio: fix virtio-ccw DMA without PV (git-fixes).\n- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n- s390/idle: fix cpu idle time calculation (bsc#1051510).\n- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n- s390/process: avoid potential reading of freed stack (bsc#1051510).\n- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n- s390/qeth: return proper errno on IO error (bsc#1051510).\n- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n- s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n- s390/zcrypt: fix memleak at release (git-fixes).\n- s390: fix stfle zero padding (bsc#1051510).\n- s390: vsie: Use effective CRYCBD.31 to check CRYCBD validity (git-fixes).\n- sc16is7xx: Fix for 'Unexpected interrupt: 8' (bsc#1051510).\n- scsi: lpfc: Add enablement of multiple adapter dumps (bsc#1154601).\n- scsi: lpfc: Add registration for CPU Offline/Online events (bsc#1154601).\n- scsi: lpfc: Change default IRQ model on AMD architectures (bsc#1154601).\n- scsi: lpfc: Clarify FAWNN error message (bsc#1154601).\n- scsi: lpfc: Fix NULL check before mempool_destroy is not needed (bsc#1154601).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_get_sgl_per_hdwq() (bsc#1154601).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_sli4_enable_intr() (bsc#1154601).\n- scsi: lpfc: Fix configuration of BB credit recovery in service parameters (bsc#1154601).\n- scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow (bsc#1154601).\n- scsi: lpfc: Fix dynamic fw log enablement check (bsc#1154601).\n- scsi: lpfc: Fix kernel crash at lpfc_nvme_info_show during remote port bounce (bsc#1154601).\n- scsi: lpfc: Fix lpfc_cpumask_of_node_init() (bsc#1154601).\n- scsi: lpfc: Fix unexpected error messages during RSCN handling (bsc#1154601).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1154601).\n- scsi: lpfc: Initialize cpu_map for not present cpus (bsc#1154601).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: lpfc: Make lpfc_debugfs_ras_log_data static (bsc#1154601).\n- scsi: lpfc: Mitigate high memory pre-allocation by SCSI-MQ (bsc#1154601).\n- scsi: lpfc: Raise config max for lpfc_fcp_mq_threshold variable (bsc#1154601).\n- scsi: lpfc: Sync with FC-NVMe-2 SLER change to require Conf with SLER (bsc#1154601).\n- scsi: lpfc: Update lpfc version to 12.6.0.1 (bsc#1154601).\n- scsi: lpfc: Update lpfc version to 12.6.0.2 (bsc#1154601).\n- scsi: lpfc: fix build error of lpfc_debugfs.c for vfree/vmalloc (bsc#1154601).\n- scsi: lpfc: fix inlining of lpfc_sli4_cleanup_poll_list() (bsc#1154601).\n- scsi: lpfc: fix spelling error in MAGIC_NUMER_xxx (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_get_scsi_buf_s3(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: lpfc_attr: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: lpfc_nvmet: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: revise nvme max queues to be hdwq count (bsc#1154601).\n- scsi: lpfc: use hdwq assigned cpu for allocation (bsc#1157160).\n- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Use correct number of vectors for online CPUs (bsc#1137223).\n- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: Fix use-after-free Read in slip_open (bsc#1051510).\n- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n- smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).\n- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- spi: atmel: Fix CS high support (bsc#1051510).\n- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n- spi: spidev: Fix OF tree warning logic (bsc#1051510).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- supported.conf:\n- synclink_gt(): fix compat_ioctl() (bsc#1051510).\n- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: check msg->req data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n- tipc: compat: allow tipc commands without arguments (bsc#1051510).\n- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n- tipc: handle the err returned from cmd header function (bsc#1051510).\n- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n- tipc: tipc clang warning (bsc#1051510).\n- tools/power/x86/intel-speed-select: Fix a read overflow in isst_set_tdp_level_msr() (bsc#1111666).\n- tools: bpftool: fix arguments for p_err() in do_event_pipe() (bsc#1109837).\n- tpm: add check after commands attribs tab allocation (bsc#1051510).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: msm_serial: Fix flow control (bsc#1051510).\n- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n- tun: fix data-race in gro_normal_list() (bsc#1111666).\n- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 ('usb-storage: Set virt_boundary_mask to avoid SG overflows') (bsc#1051510).\n- usb: chipidea: Fix otg event handler (bsc#1051510).\n- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- usb: handle warm-reset port requests on hub resume (bsc#1051510).\n- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- usbip: Fix free of unallocated memory in vhci tx (git-fixes).\n- usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n- usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n- video/hdmi: Fix AVI bar unpack (git-fixes).\n- virtio/s390: fix race on airq_areas (bsc#1051510).\n- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n- virtio_ring: fix return code on DMA mapping fails (git-fixes).\n- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n- watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n- wil6210: drop Rx multicast packets that are looped-back to STA (bsc#1111666).\n- wil6210: fix L2 RX status handling (bsc#1111666).\n- wil6210: fix RGF_CAF_ICR address for Talyn-MB (bsc#1111666).\n- wil6210: fix debugfs memory access alignment (bsc#1111666).\n- wil6210: fix freeing of rx buffers in EDMA mode (bsc#1111666).\n- wil6210: fix invalid memory access for rx_buff_mgmt debugfs (bsc#1111666).\n- wil6210: fix locking in wmi_call (bsc#1111666).\n- wil6210: prevent usage of tx ring 0 for eDMA (bsc#1111666).\n- wil6210: set edma variables only for Talyn-MB devices (bsc#1111666).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n- x86/pkeys: Update documentation about availability (bsc#1078248).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n- xfrm: Fix xfrm sel prefix length validation (git-fixes).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xsk: Fix registration of Rx-only sockets (bsc#1109837).\n- xsk: relax UMEM headroom alignment (bsc#1109837).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3317,SUSE-SLE-Module-Basesystem-15-SP1-2019-3317,SUSE-SLE-Module-Development-Tools-15-SP1-2019-3317,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3317,SUSE-SLE-Module-Legacy-15-SP1-2019-3317,SUSE-SLE-Module-Live-Patching-15-SP1-2019-3317,SUSE-SLE-Product-HA-15-SP1-2019-3317,SUSE-SLE-Product-WE-15-SP1-2019-3317", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3317-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3317-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3317-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html", }, { category: "self", summary: "SUSE Bug 1048942", url: "https://bugzilla.suse.com/1048942", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1082635", url: "https://bugzilla.suse.com/1082635", }, { category: "self", summary: "SUSE Bug 1089644", url: "https://bugzilla.suse.com/1089644", }, { category: "self", summary: "SUSE Bug 1091041", url: "https://bugzilla.suse.com/1091041", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103991", url: "https://bugzilla.suse.com/1103991", }, { category: "self", summary: "SUSE Bug 1104353", url: "https://bugzilla.suse.com/1104353", }, { category: "self", summary: "SUSE Bug 1104427", url: "https://bugzilla.suse.com/1104427", }, { category: "self", summary: "SUSE Bug 1104745", url: "https://bugzilla.suse.com/1104745", }, { category: "self", summary: "SUSE Bug 1108043", url: "https://bugzilla.suse.com/1108043", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1111666", url: "https://bugzilla.suse.com/1111666", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1113956", url: "https://bugzilla.suse.com/1113956", }, { category: "self", summary: "SUSE Bug 1113994", url: "https://bugzilla.suse.com/1113994", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1117169", url: "https://bugzilla.suse.com/1117169", }, { category: "self", summary: "SUSE Bug 1118661", url: "https://bugzilla.suse.com/1118661", }, { category: "self", summary: "SUSE Bug 1119113", url: "https://bugzilla.suse.com/1119113", }, { category: "self", summary: "SUSE Bug 1120853", url: "https://bugzilla.suse.com/1120853", }, { category: "self", summary: "SUSE Bug 1126390", url: "https://bugzilla.suse.com/1126390", }, { category: "self", summary: "SUSE Bug 1127354", url: "https://bugzilla.suse.com/1127354", }, { category: "self", summary: "SUSE Bug 1127371", url: "https://bugzilla.suse.com/1127371", }, { category: "self", summary: "SUSE Bug 1129770", url: "https://bugzilla.suse.com/1129770", }, { category: "self", summary: "SUSE Bug 1131107", url: "https://bugzilla.suse.com/1131107", }, { category: "self", summary: "SUSE Bug 1134983", url: "https://bugzilla.suse.com/1134983", }, { category: "self", summary: "SUSE Bug 1135966", url: "https://bugzilla.suse.com/1135966", }, { category: "self", summary: "SUSE Bug 1135967", url: "https://bugzilla.suse.com/1135967", }, { category: "self", summary: "SUSE Bug 1137223", url: "https://bugzilla.suse.com/1137223", }, { category: "self", summary: "SUSE Bug 1137236", url: "https://bugzilla.suse.com/1137236", }, { category: "self", summary: "SUSE Bug 1138039", url: "https://bugzilla.suse.com/1138039", }, { category: "self", summary: "SUSE Bug 1140948", url: "https://bugzilla.suse.com/1140948", }, { category: "self", summary: "SUSE Bug 1142095", url: "https://bugzilla.suse.com/1142095", }, { category: "self", summary: "SUSE Bug 1142635", url: "https://bugzilla.suse.com/1142635", }, { category: "self", summary: "SUSE Bug 1142924", url: "https://bugzilla.suse.com/1142924", }, { category: "self", summary: "SUSE Bug 1143706", url: "https://bugzilla.suse.com/1143706", }, { category: "self", summary: "SUSE Bug 1144333", url: "https://bugzilla.suse.com/1144333", }, { category: "self", summary: "SUSE Bug 1149448", url: "https://bugzilla.suse.com/1149448", }, { category: "self", summary: "SUSE Bug 1150466", url: "https://bugzilla.suse.com/1150466", }, { category: "self", summary: "SUSE Bug 1151067", url: "https://bugzilla.suse.com/1151067", }, { category: "self", summary: "SUSE Bug 1151548", url: "https://bugzilla.suse.com/1151548", }, { category: "self", summary: "SUSE Bug 1151900", url: "https://bugzilla.suse.com/1151900", }, { category: "self", summary: "SUSE Bug 1152782", url: "https://bugzilla.suse.com/1152782", }, { category: "self", summary: "SUSE Bug 1153628", url: "https://bugzilla.suse.com/1153628", }, { category: "self", summary: "SUSE Bug 1153811", url: "https://bugzilla.suse.com/1153811", }, { category: "self", summary: "SUSE Bug 1154043", url: "https://bugzilla.suse.com/1154043", }, { category: "self", summary: "SUSE Bug 1154058", url: "https://bugzilla.suse.com/1154058", }, { category: "self", summary: "SUSE Bug 1154124", url: "https://bugzilla.suse.com/1154124", }, { category: "self", summary: "SUSE Bug 1154355", url: "https://bugzilla.suse.com/1154355", }, { category: "self", summary: "SUSE Bug 1154526", url: "https://bugzilla.suse.com/1154526", }, { category: "self", summary: "SUSE Bug 1154601", url: "https://bugzilla.suse.com/1154601", }, { category: "self", summary: "SUSE Bug 1155021", url: "https://bugzilla.suse.com/1155021", }, { category: "self", summary: "SUSE Bug 1155689", url: "https://bugzilla.suse.com/1155689", }, { category: "self", summary: "SUSE Bug 1155692", url: "https://bugzilla.suse.com/1155692", }, { category: "self", summary: "SUSE Bug 1155836", url: "https://bugzilla.suse.com/1155836", }, { category: "self", summary: "SUSE Bug 1155897", url: "https://bugzilla.suse.com/1155897", }, { category: "self", summary: "SUSE Bug 1155921", url: "https://bugzilla.suse.com/1155921", }, { category: "self", summary: "SUSE Bug 1155982", url: "https://bugzilla.suse.com/1155982", }, { category: "self", summary: "SUSE Bug 1156187", url: "https://bugzilla.suse.com/1156187", }, { category: "self", summary: "SUSE Bug 1156258", url: "https://bugzilla.suse.com/1156258", }, { category: "self", summary: "SUSE Bug 1156429", url: "https://bugzilla.suse.com/1156429", }, { category: "self", summary: "SUSE Bug 1156466", url: "https://bugzilla.suse.com/1156466", }, { category: "self", summary: "SUSE Bug 1156471", url: "https://bugzilla.suse.com/1156471", }, { category: "self", summary: "SUSE Bug 1156494", url: "https://bugzilla.suse.com/1156494", }, { category: "self", summary: "SUSE Bug 1156609", url: "https://bugzilla.suse.com/1156609", }, { category: "self", summary: "SUSE Bug 1156700", url: "https://bugzilla.suse.com/1156700", }, { category: "self", summary: "SUSE Bug 1156729", url: "https://bugzilla.suse.com/1156729", }, { category: "self", summary: "SUSE Bug 1156882", url: "https://bugzilla.suse.com/1156882", }, { category: "self", summary: "SUSE Bug 1156928", url: "https://bugzilla.suse.com/1156928", }, { category: "self", summary: "SUSE Bug 1157032", url: "https://bugzilla.suse.com/1157032", }, { category: "self", summary: "SUSE Bug 1157038", url: "https://bugzilla.suse.com/1157038", }, { category: "self", summary: "SUSE Bug 1157042", url: "https://bugzilla.suse.com/1157042", }, { category: "self", summary: "SUSE Bug 1157044", url: "https://bugzilla.suse.com/1157044", }, { category: "self", summary: "SUSE Bug 1157045", url: "https://bugzilla.suse.com/1157045", }, { category: "self", summary: "SUSE Bug 1157046", url: "https://bugzilla.suse.com/1157046", }, { category: "self", summary: "SUSE Bug 1157049", url: "https://bugzilla.suse.com/1157049", }, { category: "self", summary: "SUSE Bug 1157070", url: "https://bugzilla.suse.com/1157070", }, { category: "self", summary: "SUSE Bug 1157115", url: "https://bugzilla.suse.com/1157115", }, { category: "self", summary: "SUSE Bug 1157143", url: "https://bugzilla.suse.com/1157143", }, { category: "self", summary: "SUSE Bug 1157145", url: "https://bugzilla.suse.com/1157145", }, { category: "self", summary: "SUSE Bug 1157158", url: "https://bugzilla.suse.com/1157158", }, { category: "self", summary: "SUSE Bug 1157160", url: "https://bugzilla.suse.com/1157160", }, { category: "self", summary: "SUSE Bug 1157162", url: "https://bugzilla.suse.com/1157162", }, { category: "self", summary: "SUSE Bug 1157171", url: "https://bugzilla.suse.com/1157171", }, { category: "self", summary: "SUSE Bug 1157173", url: "https://bugzilla.suse.com/1157173", }, { category: "self", summary: "SUSE Bug 1157178", url: "https://bugzilla.suse.com/1157178", }, { category: "self", summary: "SUSE Bug 1157180", url: "https://bugzilla.suse.com/1157180", }, { category: "self", summary: "SUSE Bug 1157182", url: "https://bugzilla.suse.com/1157182", }, { category: "self", summary: "SUSE Bug 1157183", url: "https://bugzilla.suse.com/1157183", }, { category: "self", summary: "SUSE Bug 1157184", url: "https://bugzilla.suse.com/1157184", }, { category: "self", summary: "SUSE Bug 1157191", url: "https://bugzilla.suse.com/1157191", }, { category: "self", summary: "SUSE Bug 1157193", url: "https://bugzilla.suse.com/1157193", }, { category: "self", summary: "SUSE Bug 1157197", url: "https://bugzilla.suse.com/1157197", }, { category: "self", summary: "SUSE Bug 1157298", url: "https://bugzilla.suse.com/1157298", }, { category: "self", summary: "SUSE Bug 1157304", url: "https://bugzilla.suse.com/1157304", }, { category: "self", summary: "SUSE Bug 1157307", url: "https://bugzilla.suse.com/1157307", }, { category: "self", summary: "SUSE Bug 1157324", url: "https://bugzilla.suse.com/1157324", }, { category: "self", summary: "SUSE Bug 1157333", url: "https://bugzilla.suse.com/1157333", }, { category: "self", summary: "SUSE Bug 1157386", url: "https://bugzilla.suse.com/1157386", }, { category: "self", summary: "SUSE Bug 1157424", url: "https://bugzilla.suse.com/1157424", }, { category: "self", summary: "SUSE Bug 1157463", url: "https://bugzilla.suse.com/1157463", }, { category: "self", summary: "SUSE Bug 1157499", url: "https://bugzilla.suse.com/1157499", }, { category: "self", summary: "SUSE Bug 1157678", url: "https://bugzilla.suse.com/1157678", }, { category: "self", summary: "SUSE Bug 1157698", url: "https://bugzilla.suse.com/1157698", }, { category: "self", summary: "SUSE Bug 1157778", url: "https://bugzilla.suse.com/1157778", }, { category: "self", summary: "SUSE Bug 1157908", url: "https://bugzilla.suse.com/1157908", }, { category: "self", summary: "SUSE Bug 1158049", url: "https://bugzilla.suse.com/1158049", }, { category: "self", summary: "SUSE Bug 1158063", url: "https://bugzilla.suse.com/1158063", }, { category: "self", summary: "SUSE Bug 1158064", url: "https://bugzilla.suse.com/1158064", }, { category: "self", summary: "SUSE Bug 1158065", url: "https://bugzilla.suse.com/1158065", }, { category: "self", summary: "SUSE Bug 1158066", url: "https://bugzilla.suse.com/1158066", }, { category: "self", summary: "SUSE Bug 1158067", url: "https://bugzilla.suse.com/1158067", }, { category: "self", summary: "SUSE Bug 1158068", url: "https://bugzilla.suse.com/1158068", }, { category: "self", summary: "SUSE Bug 1158071", url: "https://bugzilla.suse.com/1158071", }, { category: "self", summary: "SUSE Bug 1158082", url: "https://bugzilla.suse.com/1158082", }, { category: "self", summary: "SUSE Bug 1158381", url: "https://bugzilla.suse.com/1158381", }, { category: "self", summary: "SUSE Bug 1158394", url: "https://bugzilla.suse.com/1158394", }, { category: "self", summary: "SUSE Bug 1158398", url: "https://bugzilla.suse.com/1158398", }, { category: "self", summary: "SUSE Bug 1158407", url: "https://bugzilla.suse.com/1158407", }, { category: "self", summary: "SUSE Bug 1158410", url: "https://bugzilla.suse.com/1158410", }, { category: "self", summary: "SUSE Bug 1158413", url: "https://bugzilla.suse.com/1158413", }, { category: "self", summary: "SUSE Bug 1158417", url: "https://bugzilla.suse.com/1158417", }, { category: "self", summary: "SUSE Bug 1158427", url: "https://bugzilla.suse.com/1158427", }, { category: "self", summary: "SUSE Bug 1158445", url: "https://bugzilla.suse.com/1158445", }, { category: "self", summary: "SUSE CVE CVE-2019-0154 page", url: "https://www.suse.com/security/cve/CVE-2019-0154/", }, { category: "self", summary: "SUSE CVE CVE-2019-14895 page", url: "https://www.suse.com/security/cve/CVE-2019-14895/", }, { category: "self", summary: "SUSE CVE CVE-2019-14901 page", url: "https://www.suse.com/security/cve/CVE-2019-14901/", }, { category: "self", summary: "SUSE CVE CVE-2019-15916 page", url: "https://www.suse.com/security/cve/CVE-2019-15916/", }, { category: "self", summary: "SUSE CVE CVE-2019-16231 page", url: "https://www.suse.com/security/cve/CVE-2019-16231/", }, { category: "self", summary: "SUSE CVE CVE-2019-17055 page", url: "https://www.suse.com/security/cve/CVE-2019-17055/", }, { category: "self", summary: "SUSE CVE CVE-2019-18660 page", url: "https://www.suse.com/security/cve/CVE-2019-18660/", }, { category: "self", summary: "SUSE CVE CVE-2019-18683 page", url: "https://www.suse.com/security/cve/CVE-2019-18683/", }, { category: "self", summary: "SUSE CVE CVE-2019-18805 page", url: "https://www.suse.com/security/cve/CVE-2019-18805/", }, { category: "self", summary: "SUSE CVE CVE-2019-18809 page", url: "https://www.suse.com/security/cve/CVE-2019-18809/", }, { category: "self", summary: "SUSE CVE CVE-2019-19046 page", url: "https://www.suse.com/security/cve/CVE-2019-19046/", }, { category: "self", summary: "SUSE CVE CVE-2019-19049 page", url: "https://www.suse.com/security/cve/CVE-2019-19049/", }, { category: "self", summary: "SUSE CVE CVE-2019-19052 page", url: "https://www.suse.com/security/cve/CVE-2019-19052/", }, { category: "self", summary: "SUSE CVE CVE-2019-19056 page", url: "https://www.suse.com/security/cve/CVE-2019-19056/", }, { category: "self", summary: "SUSE CVE CVE-2019-19057 page", url: "https://www.suse.com/security/cve/CVE-2019-19057/", }, { category: "self", summary: "SUSE CVE CVE-2019-19058 page", url: "https://www.suse.com/security/cve/CVE-2019-19058/", }, { category: "self", summary: "SUSE CVE CVE-2019-19060 page", url: "https://www.suse.com/security/cve/CVE-2019-19060/", }, { category: "self", summary: "SUSE CVE CVE-2019-19062 page", url: "https://www.suse.com/security/cve/CVE-2019-19062/", }, { category: "self", summary: "SUSE CVE CVE-2019-19063 page", url: "https://www.suse.com/security/cve/CVE-2019-19063/", }, { category: "self", summary: "SUSE CVE CVE-2019-19065 page", url: "https://www.suse.com/security/cve/CVE-2019-19065/", }, { category: "self", summary: "SUSE CVE CVE-2019-19067 page", url: "https://www.suse.com/security/cve/CVE-2019-19067/", }, { category: "self", summary: "SUSE CVE CVE-2019-19068 page", url: "https://www.suse.com/security/cve/CVE-2019-19068/", }, { category: "self", summary: "SUSE CVE CVE-2019-19073 page", url: "https://www.suse.com/security/cve/CVE-2019-19073/", }, { category: "self", summary: "SUSE CVE CVE-2019-19074 page", url: "https://www.suse.com/security/cve/CVE-2019-19074/", }, { category: "self", summary: "SUSE CVE CVE-2019-19075 page", url: "https://www.suse.com/security/cve/CVE-2019-19075/", }, { category: "self", summary: "SUSE CVE CVE-2019-19077 page", url: "https://www.suse.com/security/cve/CVE-2019-19077/", }, { category: "self", summary: "SUSE CVE CVE-2019-19078 page", url: "https://www.suse.com/security/cve/CVE-2019-19078/", }, { category: "self", summary: "SUSE CVE CVE-2019-19080 page", url: "https://www.suse.com/security/cve/CVE-2019-19080/", }, { category: "self", summary: "SUSE CVE CVE-2019-19081 page", url: "https://www.suse.com/security/cve/CVE-2019-19081/", }, { category: "self", summary: "SUSE CVE CVE-2019-19082 page", url: "https://www.suse.com/security/cve/CVE-2019-19082/", }, { category: "self", summary: "SUSE CVE CVE-2019-19083 page", url: "https://www.suse.com/security/cve/CVE-2019-19083/", }, { category: "self", summary: "SUSE CVE CVE-2019-19227 page", url: "https://www.suse.com/security/cve/CVE-2019-19227/", }, { category: "self", summary: "SUSE CVE CVE-2019-19524 page", url: "https://www.suse.com/security/cve/CVE-2019-19524/", }, { category: "self", summary: "SUSE CVE CVE-2019-19525 page", url: "https://www.suse.com/security/cve/CVE-2019-19525/", }, { category: "self", summary: "SUSE CVE CVE-2019-19528 page", url: "https://www.suse.com/security/cve/CVE-2019-19528/", }, { category: "self", summary: "SUSE CVE CVE-2019-19529 page", url: "https://www.suse.com/security/cve/CVE-2019-19529/", }, { category: "self", summary: "SUSE CVE CVE-2019-19530 page", url: "https://www.suse.com/security/cve/CVE-2019-19530/", }, { category: "self", summary: "SUSE CVE CVE-2019-19531 page", url: "https://www.suse.com/security/cve/CVE-2019-19531/", }, { category: "self", summary: "SUSE CVE CVE-2019-19534 page", url: "https://www.suse.com/security/cve/CVE-2019-19534/", }, { category: "self", summary: "SUSE CVE CVE-2019-19536 page", url: "https://www.suse.com/security/cve/CVE-2019-19536/", }, { category: "self", summary: "SUSE CVE CVE-2019-19543 page", url: "https://www.suse.com/security/cve/CVE-2019-19543/", }, { category: "self", summary: "SUSE Bug SLE-4805", url: "https://bugzilla.suse.com/SLE-4805", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-12-17T12:09:50Z", generator: { date: "2019-12-17T12:09:50Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3317-1", initial_release_date: "2019-12-17T12:09:50Z", revision_history: [ { date: "2019-12-17T12:09:50Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-197.29.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-197.29.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-197.29.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-197.29.1.aarch64", product_id: "dlm-kmp-default-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-197.29.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-197.29.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-197.29.1.aarch64", product: { name: "kernel-default-4.12.14-197.29.1.aarch64", product_id: "kernel-default-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-197.29.1.aarch64", product: { name: "kernel-default-base-4.12.14-197.29.1.aarch64", product_id: "kernel-default-base-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-197.29.1.aarch64", product: { name: "kernel-default-devel-4.12.14-197.29.1.aarch64", product_id: "kernel-default-devel-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-197.29.1.aarch64", product: { name: "kernel-default-extra-4.12.14-197.29.1.aarch64", product_id: "kernel-default-extra-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-197.29.1.aarch64", product: { name: "kernel-default-livepatch-4.12.14-197.29.1.aarch64", product_id: "kernel-default-livepatch-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-197.29.1.aarch64", product: { name: "kernel-default-livepatch-devel-4.12.14-197.29.1.aarch64", product_id: "kernel-default-livepatch-devel-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-197.29.1.aarch64", product: { name: "kernel-obs-build-4.12.14-197.29.1.aarch64", product_id: "kernel-obs-build-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-197.29.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-197.29.1.aarch64", product_id: "kernel-obs-qa-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-197.29.1.aarch64", product: { name: "kernel-syms-4.12.14-197.29.1.aarch64", product_id: "kernel-syms-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-197.29.1.aarch64", product: { name: "kernel-vanilla-4.12.14-197.29.1.aarch64", product_id: "kernel-vanilla-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-197.29.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-197.29.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-197.29.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-197.29.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-197.29.1.aarch64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-197.29.1.aarch64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-197.29.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-197.29.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-197.29.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-197.29.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-197.29.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-197.29.1.aarch64", product: { name: "reiserfs-kmp-default-4.12.14-197.29.1.aarch64", product_id: "reiserfs-kmp-default-4.12.14-197.29.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-197.29.1.noarch", product: { name: "kernel-devel-4.12.14-197.29.1.noarch", product_id: "kernel-devel-4.12.14-197.29.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-197.29.2.noarch", product: { name: "kernel-docs-4.12.14-197.29.2.noarch", product_id: "kernel-docs-4.12.14-197.29.2.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-197.29.2.noarch", product: { name: "kernel-docs-html-4.12.14-197.29.2.noarch", product_id: "kernel-docs-html-4.12.14-197.29.2.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-197.29.1.noarch", product: { name: "kernel-macros-4.12.14-197.29.1.noarch", product_id: "kernel-macros-4.12.14-197.29.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-197.29.1.noarch", product: { name: "kernel-source-4.12.14-197.29.1.noarch", product_id: "kernel-source-4.12.14-197.29.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-197.29.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-197.29.1.noarch", product_id: "kernel-source-vanilla-4.12.14-197.29.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-197.29.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-197.29.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-197.29.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-197.29.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-197.29.1.ppc64le", product: { name: "kernel-debug-4.12.14-197.29.1.ppc64le", product_id: "kernel-debug-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-197.29.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-197.29.1.ppc64le", product_id: "kernel-debug-base-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-197.29.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-197.29.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-197.29.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-4.12.14-197.29.1.ppc64le", product_id: "kernel-debug-livepatch-devel-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-197.29.1.ppc64le", product: { name: "kernel-default-4.12.14-197.29.1.ppc64le", product_id: "kernel-default-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-197.29.1.ppc64le", product: { name: "kernel-default-base-4.12.14-197.29.1.ppc64le", product_id: "kernel-default-base-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-197.29.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-197.29.1.ppc64le", product_id: "kernel-default-devel-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-197.29.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-197.29.1.ppc64le", product_id: "kernel-default-extra-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-197.29.1.ppc64le", product: { name: "kernel-default-livepatch-4.12.14-197.29.1.ppc64le", product_id: "kernel-default-livepatch-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", product: { name: "kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", product_id: "kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", product: { name: "kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", product_id: "kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-197.29.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-197.29.1.ppc64le", product_id: "kernel-obs-build-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-197.29.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-197.29.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-197.29.1.ppc64le", product: { name: "kernel-syms-4.12.14-197.29.1.ppc64le", product_id: "kernel-syms-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-197.29.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-197.29.1.ppc64le", product_id: "kernel-vanilla-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-197.29.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-197.29.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-197.29.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-197.29.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-197.29.1.ppc64le", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-197.29.1.ppc64le", product_id: "kernel-vanilla-livepatch-devel-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-197.29.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-197.29.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", product: { name: "reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", product_id: "reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-197.29.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-197.29.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-197.29.1.s390x", product: { name: "dlm-kmp-default-4.12.14-197.29.1.s390x", product_id: "dlm-kmp-default-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-197.29.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-197.29.1.s390x", product_id: "gfs2-kmp-default-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-197.29.1.s390x", product: { name: "kernel-default-4.12.14-197.29.1.s390x", product_id: "kernel-default-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-197.29.1.s390x", product: { name: "kernel-default-base-4.12.14-197.29.1.s390x", product_id: "kernel-default-base-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-197.29.1.s390x", product: { name: "kernel-default-devel-4.12.14-197.29.1.s390x", product_id: "kernel-default-devel-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-197.29.1.s390x", product: { name: "kernel-default-extra-4.12.14-197.29.1.s390x", product_id: "kernel-default-extra-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-197.29.1.s390x", product: { name: "kernel-default-livepatch-4.12.14-197.29.1.s390x", product_id: "kernel-default-livepatch-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-197.29.1.s390x", product: { name: "kernel-default-livepatch-devel-4.12.14-197.29.1.s390x", product_id: "kernel-default-livepatch-devel-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-197.29.1.s390x", product: { name: "kernel-default-man-4.12.14-197.29.1.s390x", product_id: "kernel-default-man-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-197.29.1.s390x", product: { name: "kernel-obs-build-4.12.14-197.29.1.s390x", product_id: "kernel-obs-build-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-197.29.1.s390x", product: { name: "kernel-obs-qa-4.12.14-197.29.1.s390x", product_id: "kernel-obs-qa-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-197.29.1.s390x", product: { name: "kernel-syms-4.12.14-197.29.1.s390x", product_id: "kernel-syms-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-197.29.1.s390x", product: { name: "kernel-vanilla-4.12.14-197.29.1.s390x", product_id: "kernel-vanilla-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-197.29.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-197.29.1.s390x", product_id: "kernel-vanilla-base-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-197.29.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-197.29.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-197.29.1.s390x", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-197.29.1.s390x", product_id: "kernel-vanilla-livepatch-devel-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-197.29.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-197.29.1.s390x", product_id: "kernel-zfcpdump-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-197.29.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-197.29.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-197.29.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-197.29.1.s390x", product_id: "kselftests-kmp-default-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-197.29.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-197.29.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-197.29.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-197.29.1.s390x", product: { name: "reiserfs-kmp-default-4.12.14-197.29.1.s390x", product_id: "reiserfs-kmp-default-4.12.14-197.29.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-197.29.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-197.29.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-197.29.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-197.29.1.x86_64", product_id: "dlm-kmp-default-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-197.29.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-197.29.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-197.29.1.x86_64", product: { name: "kernel-debug-4.12.14-197.29.1.x86_64", product_id: "kernel-debug-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-197.29.1.x86_64", product: { name: "kernel-debug-base-4.12.14-197.29.1.x86_64", product_id: "kernel-debug-base-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-197.29.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-197.29.1.x86_64", product_id: "kernel-debug-devel-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-197.29.1.x86_64", product: { name: "kernel-debug-livepatch-devel-4.12.14-197.29.1.x86_64", product_id: "kernel-debug-livepatch-devel-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-197.29.1.x86_64", product: { name: "kernel-default-4.12.14-197.29.1.x86_64", product_id: "kernel-default-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-197.29.1.x86_64", product: { name: "kernel-default-base-4.12.14-197.29.1.x86_64", product_id: "kernel-default-base-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-197.29.1.x86_64", product: { name: "kernel-default-devel-4.12.14-197.29.1.x86_64", product_id: "kernel-default-devel-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-197.29.1.x86_64", product: { name: "kernel-default-extra-4.12.14-197.29.1.x86_64", product_id: "kernel-default-extra-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-197.29.1.x86_64", product: { name: "kernel-default-livepatch-4.12.14-197.29.1.x86_64", product_id: "kernel-default-livepatch-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", product: { name: "kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", product_id: "kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-197.29.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-197.29.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-197.29.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-197.29.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-197.29.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-197.29.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-4.12.14-197.29.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-4.12.14-197.29.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", product: { name: "kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", product_id: "kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-197.29.1.x86_64", product: { name: "kernel-obs-build-4.12.14-197.29.1.x86_64", product_id: "kernel-obs-build-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-197.29.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-197.29.1.x86_64", product_id: "kernel-obs-qa-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-197.29.1.x86_64", product: { name: "kernel-syms-4.12.14-197.29.1.x86_64", product_id: "kernel-syms-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-197.29.1.x86_64", product: { name: "kernel-vanilla-4.12.14-197.29.1.x86_64", product_id: "kernel-vanilla-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-197.29.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-197.29.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-197.29.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-197.29.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-197.29.1.x86_64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-197.29.1.x86_64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-197.29.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-197.29.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-197.29.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-197.29.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-197.29.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-197.29.1.x86_64", product: { name: "reiserfs-kmp-default-4.12.14-197.29.1.x86_64", product_id: "reiserfs-kmp-default-4.12.14-197.29.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP1", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP1", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP1", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP1", product: { name: "SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP1", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP1", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP1", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.29.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", }, product_reference: "kernel-default-4.12.14-197.29.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.29.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", }, product_reference: "kernel-default-4.12.14-197.29.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.29.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", }, product_reference: "kernel-default-4.12.14-197.29.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", }, product_reference: "kernel-default-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.29.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-197.29.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.29.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-197.29.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.29.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", }, product_reference: "kernel-default-base-4.12.14-197.29.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.29.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-197.29.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.29.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-197.29.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.29.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-197.29.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-197.29.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", }, product_reference: "kernel-default-man-4.12.14-197.29.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-197.29.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", }, product_reference: "kernel-devel-4.12.14-197.29.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-197.29.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", }, product_reference: "kernel-macros-4.12.14-197.29.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-4.12.14-197.29.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", }, product_reference: "kernel-zfcpdump-4.12.14-197.29.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-197.29.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", }, product_reference: "kernel-docs-4.12.14-197.29.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-197.29.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-197.29.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-197.29.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-197.29.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", }, product_reference: "kernel-source-4.12.14-197.29.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.29.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", }, product_reference: "kernel-syms-4.12.14-197.29.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.29.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-197.29.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.29.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", }, product_reference: "kernel-syms-4.12.14-197.29.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", }, product_reference: "kernel-syms-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.29.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.29.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.29.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.29.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", }, product_reference: "reiserfs-kmp-default-4.12.14-197.29.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-197.29.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", }, product_reference: "kernel-default-livepatch-4.12.14-197.29.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", }, product_reference: "kernel-default-livepatch-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", }, product_reference: "kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-197.29.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", }, product_reference: "cluster-md-kmp-default-4.12.14-197.29.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-197.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-197.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-197.29.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-197.29.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", }, product_reference: "dlm-kmp-default-4.12.14-197.29.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-197.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-197.29.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-197.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-197.29.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-197.29.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", }, product_reference: "gfs2-kmp-default-4.12.14-197.29.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-197.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-197.29.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-197.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-197.29.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-197.29.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", }, product_reference: "ocfs2-kmp-default-4.12.14-197.29.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-197.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-197.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-197.29.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-197.29.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", }, product_reference: "kernel-default-extra-4.12.14-197.29.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0154", }, ], notes: [ { category: "general", text: "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0154", url: "https://www.suse.com/security/cve/CVE-2019-0154", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0154", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2019-0154", url: "https://bugzilla.suse.com/1181720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "important", }, ], title: "CVE-2019-0154", }, { cve: "CVE-2019-14895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14895", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14895", url: "https://www.suse.com/security/cve/CVE-2019-14895", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1157158 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157158", }, { category: "external", summary: "SUSE Bug 1173100 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173100", }, { category: "external", summary: "SUSE Bug 1173660 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "important", }, ], title: "CVE-2019-14895", }, { cve: "CVE-2019-14901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14901", }, ], notes: [ { category: "general", text: "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14901", url: "https://www.suse.com/security/cve/CVE-2019-14901", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14901", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1173661 for CVE-2019-14901", url: "https://bugzilla.suse.com/1173661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "important", }, ], title: "CVE-2019-14901", }, { cve: "CVE-2019-15916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15916", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15916", url: "https://www.suse.com/security/cve/CVE-2019-15916", }, { category: "external", summary: "SUSE Bug 1149448 for CVE-2019-15916", url: "https://bugzilla.suse.com/1149448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "low", }, ], title: "CVE-2019-15916", }, { cve: "CVE-2019-16231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16231", }, ], notes: [ { category: "general", text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16231", url: "https://www.suse.com/security/cve/CVE-2019-16231", }, { category: "external", summary: "SUSE Bug 1150466 for CVE-2019-16231", url: "https://bugzilla.suse.com/1150466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "low", }, ], title: "CVE-2019-16231", }, { cve: "CVE-2019-17055", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17055", }, ], notes: [ { category: "general", text: "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17055", url: "https://www.suse.com/security/cve/CVE-2019-17055", }, { category: "external", summary: "SUSE Bug 1152782 for CVE-2019-17055", url: "https://bugzilla.suse.com/1152782", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "low", }, ], title: "CVE-2019-17055", }, { cve: "CVE-2019-18660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18660", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18660", url: "https://www.suse.com/security/cve/CVE-2019-18660", }, { category: "external", summary: "SUSE Bug 1157038 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157038", }, { category: "external", summary: "SUSE Bug 1157923 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-18660", }, { cve: "CVE-2019-18683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18683", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18683", url: "https://www.suse.com/security/cve/CVE-2019-18683", }, { category: "external", summary: "SUSE Bug 1155897 for CVE-2019-18683", url: "https://bugzilla.suse.com/1155897", }, { category: "external", summary: "SUSE Bug 1173868 for CVE-2019-18683", url: "https://bugzilla.suse.com/1173868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-18683", }, { cve: "CVE-2019-18805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18805", }, ], notes: [ { category: "general", text: "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18805", url: "https://www.suse.com/security/cve/CVE-2019-18805", }, { category: "external", summary: "SUSE Bug 1156187 for CVE-2019-18805", url: "https://bugzilla.suse.com/1156187", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "low", }, ], title: "CVE-2019-18805", }, { cve: "CVE-2019-18809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18809", }, ], notes: [ { category: "general", text: "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18809", url: "https://www.suse.com/security/cve/CVE-2019-18809", }, { category: "external", summary: "SUSE Bug 1156258 for CVE-2019-18809", url: "https://bugzilla.suse.com/1156258", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-18809", }, { cve: "CVE-2019-19046", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19046", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19046", url: "https://www.suse.com/security/cve/CVE-2019-19046", }, { category: "external", summary: "SUSE Bug 1157304 for CVE-2019-19046", url: "https://bugzilla.suse.com/1157304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19046", }, { cve: "CVE-2019-19049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19049", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19049", url: "https://www.suse.com/security/cve/CVE-2019-19049", }, { category: "external", summary: "SUSE Bug 1157173 for CVE-2019-19049", url: "https://bugzilla.suse.com/1157173", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19049", }, { cve: "CVE-2019-19052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19052", }, ], notes: [ { category: "general", text: "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19052", url: "https://www.suse.com/security/cve/CVE-2019-19052", }, { category: "external", summary: "SUSE Bug 1157324 for CVE-2019-19052", url: "https://bugzilla.suse.com/1157324", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19052", }, { cve: "CVE-2019-19056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19056", }, ], notes: [ { category: "general", text: "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19056", url: "https://www.suse.com/security/cve/CVE-2019-19056", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19056", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19057", }, ], notes: [ { category: "general", text: "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19057", url: "https://www.suse.com/security/cve/CVE-2019-19057", }, { category: "external", summary: "SUSE Bug 1157193 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157193", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "low", }, ], title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19058", }, ], notes: [ { category: "general", text: "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19058", url: "https://www.suse.com/security/cve/CVE-2019-19058", }, { category: "external", summary: "SUSE Bug 1157145 for CVE-2019-19058", url: "https://bugzilla.suse.com/1157145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19058", }, { cve: "CVE-2019-19060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19060", }, ], notes: [ { category: "general", text: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19060", url: "https://www.suse.com/security/cve/CVE-2019-19060", }, { category: "external", summary: "SUSE Bug 1157178 for CVE-2019-19060", url: "https://bugzilla.suse.com/1157178", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19060", }, { cve: "CVE-2019-19062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19062", }, ], notes: [ { category: "general", text: "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19062", url: "https://www.suse.com/security/cve/CVE-2019-19062", }, { category: "external", summary: "SUSE Bug 1157333 for CVE-2019-19062", url: "https://bugzilla.suse.com/1157333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19063", }, ], notes: [ { category: "general", text: "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19063", url: "https://www.suse.com/security/cve/CVE-2019-19063", }, { category: "external", summary: "SUSE Bug 1157298 for CVE-2019-19063", url: "https://bugzilla.suse.com/1157298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19063", }, { cve: "CVE-2019-19065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19065", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19065", url: "https://www.suse.com/security/cve/CVE-2019-19065", }, { category: "external", summary: "SUSE Bug 1157191 for CVE-2019-19065", url: "https://bugzilla.suse.com/1157191", }, { category: "external", summary: "SUSE Bug 1173961 for CVE-2019-19065", url: "https://bugzilla.suse.com/1173961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "important", }, ], title: "CVE-2019-19065", }, { cve: "CVE-2019-19067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19067", }, ], notes: [ { category: "general", text: "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19067", url: "https://www.suse.com/security/cve/CVE-2019-19067", }, { category: "external", summary: "SUSE Bug 1157180 for CVE-2019-19067", url: "https://bugzilla.suse.com/1157180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19068", }, ], notes: [ { category: "general", text: "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19068", url: "https://www.suse.com/security/cve/CVE-2019-19068", }, { category: "external", summary: "SUSE Bug 1157307 for CVE-2019-19068", url: "https://bugzilla.suse.com/1157307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19068", }, { cve: "CVE-2019-19073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19073", }, ], notes: [ { category: "general", text: "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19073", url: "https://www.suse.com/security/cve/CVE-2019-19073", }, { category: "external", summary: "SUSE Bug 1157070 for CVE-2019-19073", url: "https://bugzilla.suse.com/1157070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19074", }, ], notes: [ { category: "general", text: "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19074", url: "https://www.suse.com/security/cve/CVE-2019-19074", }, { category: "external", summary: "SUSE Bug 1157143 for CVE-2019-19074", url: "https://bugzilla.suse.com/1157143", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19075", }, ], notes: [ { category: "general", text: "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19075", url: "https://www.suse.com/security/cve/CVE-2019-19075", }, { category: "external", summary: "SUSE Bug 1157162 for CVE-2019-19075", url: "https://bugzilla.suse.com/1157162", }, { category: "external", summary: "SUSE Bug 1173958 for CVE-2019-19075", url: "https://bugzilla.suse.com/1173958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "low", }, ], title: "CVE-2019-19075", }, { cve: "CVE-2019-19077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19077", }, ], notes: [ { category: "general", text: "A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19077", url: "https://www.suse.com/security/cve/CVE-2019-19077", }, { category: "external", summary: "SUSE Bug 1157171 for CVE-2019-19077", url: "https://bugzilla.suse.com/1157171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19077", }, { cve: "CVE-2019-19078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19078", }, ], notes: [ { category: "general", text: "A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19078", url: "https://www.suse.com/security/cve/CVE-2019-19078", }, { category: "external", summary: "SUSE Bug 1157032 for CVE-2019-19078", url: "https://bugzilla.suse.com/1157032", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19078", }, { cve: "CVE-2019-19080", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19080", }, ], notes: [ { category: "general", text: "Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19080", url: "https://www.suse.com/security/cve/CVE-2019-19080", }, { category: "external", summary: "SUSE Bug 1157044 for CVE-2019-19080", url: "https://bugzilla.suse.com/1157044", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19080", }, { cve: "CVE-2019-19081", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19081", }, ], notes: [ { category: "general", text: "A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19081", url: "https://www.suse.com/security/cve/CVE-2019-19081", }, { category: "external", summary: "SUSE Bug 1157045 for CVE-2019-19081", url: "https://bugzilla.suse.com/1157045", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19081", }, { cve: "CVE-2019-19082", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19082", }, ], notes: [ { category: "general", text: "Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19082", url: "https://www.suse.com/security/cve/CVE-2019-19082", }, { category: "external", summary: "SUSE Bug 1157046 for CVE-2019-19082", url: "https://bugzilla.suse.com/1157046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19082", }, { cve: "CVE-2019-19083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19083", }, ], notes: [ { category: "general", text: "Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19083", url: "https://www.suse.com/security/cve/CVE-2019-19083", }, { category: "external", summary: "SUSE Bug 1157049 for CVE-2019-19083", url: "https://bugzilla.suse.com/1157049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19083", }, { cve: "CVE-2019-19227", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19227", }, ], notes: [ { category: "general", text: "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19227", url: "https://www.suse.com/security/cve/CVE-2019-19227", }, { category: "external", summary: "SUSE Bug 1157678 for CVE-2019-19227", url: "https://bugzilla.suse.com/1157678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19227", }, { cve: "CVE-2019-19524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19524", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19524", url: "https://www.suse.com/security/cve/CVE-2019-19524", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158413 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158413", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "low", }, ], title: "CVE-2019-19524", }, { cve: "CVE-2019-19525", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19525", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19525", url: "https://www.suse.com/security/cve/CVE-2019-19525", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158417 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158417", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19525", }, { cve: "CVE-2019-19528", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19528", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19528", url: "https://www.suse.com/security/cve/CVE-2019-19528", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158407 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158407", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19528", }, { cve: "CVE-2019-19529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19529", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19529", url: "https://www.suse.com/security/cve/CVE-2019-19529", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19529", }, { cve: "CVE-2019-19530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19530", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19530", url: "https://www.suse.com/security/cve/CVE-2019-19530", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158410 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158410", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "moderate", }, ], title: "CVE-2019-19530", }, { cve: "CVE-2019-19531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19531", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19531", url: "https://www.suse.com/security/cve/CVE-2019-19531", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158427", }, { category: "external", summary: "SUSE Bug 1158445 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158445", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "low", }, ], title: "CVE-2019-19531", }, { cve: "CVE-2019-19534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19534", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19534", url: "https://www.suse.com/security/cve/CVE-2019-19534", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158398 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158398", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "low", }, ], title: "CVE-2019-19534", }, { cve: "CVE-2019-19536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19536", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19536", url: "https://www.suse.com/security/cve/CVE-2019-19536", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158394 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158394", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "low", }, ], title: "CVE-2019-19536", }, { cve: "CVE-2019-19543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19543", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19543", url: "https://www.suse.com/security/cve/CVE-2019-19543", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19543", url: "https://bugzilla.suse.com/1158427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.29.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.29.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.29.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:09:50Z", details: "low", }, ], title: "CVE-2019-19543", }, ], }
suse-su-2020:0093-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-20095: mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c had some error-handling cases that did not free allocated hostcmd memory. This will cause a memory leak and denial of service (bnc#1159909).\n- CVE-2019-20054: Fixed a a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).\n- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19319: A setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).\n- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).\n- CVE-2019-18808: A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption) (bnc#1156259).\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c where the length of variable elements in a beacon head were not checked, leading to a buffer overflow (bnc#1152107).\n- CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures (bnc#1157303).\n- CVE-2019-19051: There was a memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1159024).\n- CVE-2019-19338: There was an incomplete fix for Transaction Asynchronous Abort (TAA) (bnc#1158954).\n- CVE-2019-19332: There was an OOB memory write via kvm_dev_ioctl_get_cpuid (bnc#1158827).\n- CVE-2019-19537: There was a race condition bug that can be caused by a malicious USB device in the USB character device driver layer (bnc#1158904).\n- CVE-2019-19535: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bnc#1158903).\n- CVE-2019-19527: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bnc#1158900).\n- CVE-2019-19526: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver (bnc#1158893).\n- CVE-2019-19533: There was an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bnc#1158834).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers (bnc#1158824).\n- CVE-2019-19523: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bnc#1158381 1158823 1158834).\n- CVE-2019-15213: There was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).\n- CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).\n- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).\n- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).\n- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).\n- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).\n- CVE-2019-19528: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (bnc#1158407).\n- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).\n- CVE-2019-19529: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver (bnc#1158381).\n- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).\n- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).\n- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).\n- CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1156258).\n- CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure (bnc#1157304).\n- CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157032).\n- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).\n- CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157307).\n- CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157298).\n- CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel there was a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client (bnc#1157678).\n- CVE-2019-19081: A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157045).\n- CVE-2019-19080: Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157044).\n- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).\n- CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering copy to udata failures (bnc#1157171).\n- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).\n- CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures (bsc#1157180).\n- CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157178).\n- CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures (bsc#1157173).\n- CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures (bnc#1157162).\n- CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures (bnc#1157145).\n- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).\n- CVE-2019-19073: Fixed memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures (bnc#1157070).\n- CVE-2019-19083: Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157049).\n- CVE-2019-19082: Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157046).\n- CVE-2019-15916: An issue was discovered in the Linux kernel There was a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service (bnc#1149448).\n- CVE-2019-0154: Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1135966).\n- CVE-2019-0155: Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may have allowed an authenticated user to potentially enable escalation of privilege via local access (bnc#1135967).\n- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).\n- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).\n- CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket (bnc#1152782).\n- CVE-2019-16995: In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d (bnc#1152685).\n- CVE-2019-11135: TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access (bnc#1139073).\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150457).\n- CVE-2018-12207: Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may have allowed an authenticated user to potentially enable denial of service of the host system via local access (bnc#1117665).\n- CVE-2019-10220: Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists (bnc#1144903).\n- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (bnc#1154372).\n- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).\n- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).\n- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).\n- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).\n- CVE-2019-14821: An out-of-bounds access issue was found in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation (bnc#1151350).\n- CVE-2017-18595: An issue was discovered in the Linux kernel A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (bnc#1149555).\n- CVE-2019-9506: The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and did not prevent an attacker from influencing the key length negotiation. This allowed practical brute-force attacks (aka 'KNOB') that can decrypt traffic and inject arbitrary ciphertext without the victim noticing (bnc#1146042).\n- CVE-2019-14835: A buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration (bnc#1150112).\n- CVE-2019-9456: Ther is an issue inside the USB monitor driver that can lead to a possible OOB write due to a missing bounds check (bnc#1150025).\n- CVE-2019-15031: In the Linux kernel on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt (bnc#1149713).\n- CVE-2019-15030: In the Linux kernel on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception (bnc#1149713).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).\n- ACPI / PCI: fix acpi_pci_irq_enable() memory leak (bsc#1051510).\n- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n- ACPI / hotplug / PCI: Allocate resources directly under the non-hotplug bridge (bsc#1111666).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- ACPI / property: Fix acpi_graph_get_remote_endpoint() name in kerneldoc (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- ACPI: OSL: only free map once in osl.c (bsc#1051510).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: custom_method: fix memory leaks (bsc#1051510).\n- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).\n- ACPICA: Increase total number of possible Owner IDs (bsc#1148859).\n- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n- ALSA: 6fire: Drop the dead code (git-fixes).\n- ALSA: aoa: onyx: always initialize register read value (bsc#1051510).\n- ALSA: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).\n- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n- ALSA: firewire-motu: add support for MOTU 4pre (bsc#1111666).\n- ALSA: firewire-tascam: check intermediate state of clock status and retry (bsc#1051510).\n- ALSA: firewire-tascam: handle error code when getting current source of clock (bsc#1051510).\n- ALSA: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n- ALSA: hda - Fix potential endless loop at applying quirks (bsc#1051510).\n- ALSA: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda - fixup for the bass speaker on Lenovo Carbon X1 7th gen (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).\n- ALSA: hda/hdmi - Clear codec->relaxed_resume flag at unbinding (git-fixes).\n- ALSA: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).\n- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: hda/realtek - Add quirk for HP Pavilion 15 (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC623 (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).\n- ALSA: hda/realtek - Enable internal speaker and headset mic of ASUS UX431FL (bsc#1051510).\n- ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC (git-fixes).\n- ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop (git-fixes).\n- ALSA: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek - Fix inverted bass GPIO pin on Acer 8951G (git-fixes).\n- ALSA: hda/realtek - Fix overridden device-specific initialization (bsc#1051510).\n- ALSA: hda/realtek - Fix the problem of two front mics on a ThinkCentre (bsc#1051510).\n- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).\n- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - PCI quirk for Medion E4254 (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).\n- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda: Fix racy display power access (bsc#1156928).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: hda: hdmi - fix port numbering for ICL and TGL platforms (git-fixes).\n- ALSA: hda: hdmi - remove redundant code comments (git-fixes).\n- ALSA: hda: kabi workaround for generic parser flag (bsc#1051510).\n- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n- ALSA: pcm: Yet another missing check of non-cached buffer type (bsc#1111666).\n- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for Gustard U16/X26 USB Interface (bsc#1051510).\n- ALSA: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Add skip_validation option (git-fixes).\n- ALSA: usb-audio: Clean up check_input_term() (bsc#1051510).\n- ALSA: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1111666).\n- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n- ALSA: usb-audio: Fix NULL dereference at parsing BADD (git-fixes).\n- ALSA: usb-audio: Fix copy and paste error in the validator (bsc#1111666).\n- ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk() (git-fixes).\n- ALSA: usb-audio: Fix incorrect size check for processing/extension units (git-fixes).\n- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n- ALSA: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).\n- ALSA: usb-audio: More validations of descriptor units (bsc#1051510).\n- ALSA: usb-audio: Remove superfluous bLength checks (bsc#1051510).\n- ALSA: usb-audio: Simplify parse_audio_unit() (bsc#1051510).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- ALSA: usb-audio: Unify audioformat release code (bsc#1051510).\n- ALSA: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).\n- ALSA: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).\n- ALSA: usb-audio: fix PCM device order (bsc#1051510).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n- ALSA: usb-audio: remove some dead code (bsc#1051510).\n- ALSA: usb-audio: sound: usb: usb true/false for bool return type (git-fixes).\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: Intel: Baytrail: Fix implicit fallthrough warning (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).\n- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n- ASoC: es8328: Fix copy-paste error in es8328_right_line_controls (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: sun4i-i2s: RX and TX counter registers are swapped (bsc#1051510).\n- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- ASoC: wm8737: Fix copy-paste error in wm8737_snd_controls (bsc#1051510).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ASoC: wm8988: fix typo in wm8988_right_line_controls (bsc#1051510).\n- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- Add 3 not-needeed commits to blacklist.conf from git-fixes.\n- Add Acer Aspire Ethos 8951G model quirk (bsc#1051510).\n- Add kernel module compression support (bsc#1135854).\n- Add some qedf commits to blacklist file (bsc#1149976).\n- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- Bluetooth: btqca: Add a short delay before downloading the NVM (bsc#1051510).\n- Bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n- Bluetooth: delete a stray unlock (bsc#1051510).\n- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).\n- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n- Btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- Btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- Btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- Btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- Btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- Btrfs: do not abort transaction at btrfs_update_root() after failure to COW path (bsc#1150933).\n- Btrfs: fix assertion failure during fsync and use of stale transaction (bsc#1150562).\n- Btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n- Btrfs: fix use-after-free when using the tree modification log (bsc#1151891).\n- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n- CIFS: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n- CIFS: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n- CIFS: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n- CIFS: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n- CIFS: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n- CIFS: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n- CIFS: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n- CIFS: fix max ea value size (bsc#1144333, bsc#1154355).\n- Compile nvme.ko as module (bsc#1150846)\n- Disable CONFIG_DEBUG_PAGEALLOC (bsc#1159096).\n- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n- Drop an ASoC fix that was reverted in 4.14.y stable\n- Drop multiversion(kernel) from the KMP template (bsc#1127155).\n- EDAC/amd64: Adjust printed chip select sizes when interleaved (bsc#1131489).\n- EDAC/amd64: Cache secondary Chip Select registers (bsc#1131489).\n- EDAC/amd64: Decode syndrome before translating address (bsc#1114279).\n- EDAC/amd64: Decode syndrome before translating address (bsc#1131489).\n- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1131489).\n- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1131489).\n- EDAC/amd64: Recognize DRAM device type ECC capability (bsc#1131489).\n- EDAC/amd64: Recognize x16 symbol size (bsc#1131489).\n- EDAC/amd64: Set maximum channel layer size depending on family (bsc#1131489).\n- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1131489).\n- EDAC/amd64: Support more than two Unified Memory Controllers (bsc#1131489).\n- EDAC/amd64: Support more than two controllers for chip selects handling (bsc#1131489).\n- EDAC/amd64: Use a macro for iterating over Unified Memory Controllers (bsc#1131489).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n- HID: Fix assumption that devices have inputs (git-fixes).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n- HID: cp2112: prevent sleeping function called from invalid context (bsc#1051510).\n- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).\n- HID: fix error message in hid_open_report() (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).\n- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/core: Add mitigation for Spectre V1 (bsc#1155671)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Fix steering rule of drop and count (bsc#1103991 ).\n- IB/mlx5: Free mpi in mp_slave mode (bsc#1103991).\n- IB/mlx5: Remove dead code (bsc#1103991).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command (bsc#1103991).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- Input: elan_i2c - remove Lenovo Legion Y7000 PnpID (bsc#1051510).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- KABI protect struct vmem_altmap (bsc#1150305).\n- KVM: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- KVM: PPC: Book3S HV: Check for MMU ready on piggybacked virtual cores (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not lose pending doorbell request on migration on P9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not push XIVE context when not using XIVE device (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix lockdep warning when entering the guest (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix race in re-enabling XIVE escalation interrupts (bsc#1061840).\n- KVM: PPC: Book3S HV: Handle virtual mode in XIVE VCPU push code (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Free escalation interrupts before disabling the VP (bsc#1061840).\n- KVM: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- KVM: PPC: Book3S: Fix incorrect guest-to-user-translation error handling (bsc#1061840).\n- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n- KVM: X86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).\n- KVM: X86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).\n- KVM: arm/arm64: Clean dcache to PoC when changing PTE due to CoW (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Detangle kvm_mmu.h from kvm_hyp.h (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Drop vcpu parameter from guest cache maintenance operartions (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Limit icache invalidation to prefetch aborts (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Only clean the dcache on translation fault (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Preserve Exec permission across R/W permission faults (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Split dcache/icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe (jsc#ECO-561).\n- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).\n- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).\n- KVM: s390: fix __insn32_query() inline assembly (git-fixes).\n- KVM: s390: vsie: Do not shadow CRYCB when no AP and no keys (git-fixes).\n- KVM: s390: vsie: Return correct values for Invalid CRYCB format (git-fixes).\n- KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).\n- KVM: x86: Remove a spurious export of a static function (bsc#1158954).\n- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- NFC: fdp: fix incorrect free object (networking-stable-19_11_10).\n- NFC: fix attrs checks in netlink interface (bsc#1051510).\n- NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- NFC: pn533: fix use-after-free and memleaks (bsc#1051510).\n- NFC: st21nfca: fix double free (networking-stable-19_11_10).\n- NFS: Do not interrupt file writeout due to fatal errors (git-fixes).\n- NFS: Do not open code clearing of delegation state (git-fixes).\n- NFS: Ensure O_DIRECT reports an error if the bytes read/written is 0 (git-fixes).\n- NFS: Fix regression whereby fscache errors are appearing on 'nofsc' mounts (git-fixes).\n- NFS: Forbid setting AF_INET6 to 'struct sockaddr_in'->sin_family (git-fixes).\n- NFS: Refactor nfs_lookup_revalidate() (git-fixes).\n- NFS: Remove redundant semicolon (git-fixes).\n- NFS4: Fix v4.0 client state corruption when mount (git-fixes).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- NFSv4.1: Again fix a race where CB_NOTIFY_LOCK fails to wake a waiter (git-fixes).\n- NFSv4.1: Fix open stateid recovery (git-fixes).\n- NFSv4.1: Only reap expired delegations (git-fixes).\n- NFSv4/pnfs: Fix a page lock leak in nfs_pageio_resend() (git-fixes).\n- NFSv4: Fix OPEN / CLOSE race (git-fixes).\n- NFSv4: Fix a potential sleep while atomic in nfs4_do_reclaim() (git-fixes).\n- NFSv4: Fix an Oops in nfs4_do_setattr (git-fixes).\n- NFSv4: Fix delegation state recovery (git-fixes).\n- NFSv4: Fix lookup revalidate of regular files (git-fixes).\n- NFSv4: Handle the special Linux file open access mode (git-fixes).\n- NFSv4: Only pass the delegation to setattr if we're sending a truncate (git-fixes).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).\n- PCI/PM: Clear PCIe PME Status even for legacy power management (bsc#1111666).\n- PCI/PME: Fix possible use-after-free on remove (git-fixes).\n- PCI/PTM: Remove spurious 'd' from granularity message (bsc#1051510).\n- PCI/VPD: Prevent VPD access for Amazon's Annapurna Labs Root Port (bsc#1152187,bsc#1152525).\n- PCI: Add ACS quirk for Amazon Annapurna Labs root ports (bsc#1152187,bsc#1152525).\n- PCI: Add Amazon's Annapurna Labs vendor ID (bsc#1152187,bsc#1152525).\n- PCI: Add quirk to disable MSI-X support for Amazon's Annapurna Labs Root Port (bsc#1152187,bsc#1152525).\n- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- PCI: al: Add Amazon Annapurna Labs PCIe host controller driver (SLE-9332).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n- PCI: hv: Detect and fix Hyper-V PCI domain number collision (bsc#1150423).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PCI: pciehp: Avoid returning prematurely from sysfs requests (git-fixes).\n- PCI: pciehp: Do not disable interrupt twice on suspend (bsc#1111666).\n- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n- PCI: tegra: Enable Relaxed Ordering only for Tegra20 and Tegra30 (git-fixes).\n- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).\n- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).\n- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n- PM / devfreq: passive: fix compiler warning (bsc#1051510).\n- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n- PM: sleep: Fix possible overflow in pm_system_cancel_wakeup() (bsc#1051510).\n- PNFS fallback to MDS if no deviceid found (git-fixes).\n- RDMA/bnxt_re: Enable SRIOV VF support on Broadcom's 57500 adapter series (bsc#1154916).\n- RDMA/bnxt_re: Fix chip number validation Broadcom's Gen P5 series (bsc#1157895).\n- RDMA/bnxt_re: Fix missing le16_to_cpu (bsc#1157895).\n- RDMA/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).\n- RDMA/bnxt_re: Fix stat push into dma buffer on gen p5 devices (bsc#1157115)\n- RDMA/efa: Add Amazon EFA driver (jsc#SLE-4805)\n- RDMA/efa: Clear the admin command buffer prior to its submission (git-fixes) Patch was already picked through Amazon driver repo but was not marked with a Git-commit tag\n- RDMA/hns: Add mtr support for mixed multihop addressing (bsc#1104427).\n- RDMA/hns: Add reset process for function-clear (bsc#1155061).\n- RDMA/hns: Bugfix for calculating qp buffer size (bsc#1104427 ).\n- RDMA/hns: Bugfix for filling the sge of srq (bsc#1104427 ).\n- RDMA/hns: Bugfix for qpc/cqc timer configuration (bsc#1104427 bsc#1126206).\n- RDMA/hns: Correct the value of srq_desc_size (bsc#1104427 ).\n- RDMA/hns: Fix an error code in hns_roce_set_user_sq_size() (bsc#1104427).\n- RDMA/hns: Fix comparison of unsigned long variable 'end' with less than zero (bsc#1104427 bsc#1137236).\n- RDMA/hns: Fix to support 64K page for srq (bsc#1104427 ).\n- RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 ).\n- RDMA/hns: Fixs hw access invalid dma memory error (bsc#1104427 ).\n- RDMA/hns: Fixup qp release bug (bsc#1104427).\n- RDMA/hns: Modify ba page size for cqe (bsc#1104427).\n- RDMA/hns: Prevent memory leaks of eq->buf_list (bsc#1104427 ).\n- RDMA/hns: Remove set but not used variable 'fclr_write_fail_flag' (bsc#1104427).\n- RDMA/hns: Remove the some magic number (bsc#1155061).\n- RDMA/hns: Remove unnecessary print message in aeq (bsc#1104427 ).\n- RDMA/hns: Replace magic numbers with #defines (bsc#1104427 ).\n- RDMA/hns: Set reset flag when hw resetting (bsc#1104427 ).\n- RDMA/hns: Use %pK format pointer print (bsc#1104427 ).\n- RDMA/hns: fix inverted logic of readl read and shift (bsc#1104427).\n- RDMA/hns: reset function when removing module (bsc#1104427 ).\n- RDMA/restrack: Track driver QP types in resource tracker (jsc#SLE-4805)\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- RDMa/hns: Do not stuck in endless timeout loop (bsc#1104427 ).\n- README.BRANCH: Add Denis as branch maintainer\n- README.BRANCH: Removing myself from the maintainer list\n- README.BRANCH: Removing myself from the maintainer list.\n- README.BRANCH: removing myself from the maintainer list\n- Revert 'mmc: sdhci: Fix incorrect switch to HS mode' (bsc#1051510).\n- SUNRPC fix regression in umount of a secure mount (git-fixes).\n- SUNRPC/nfs: Fix return value for nfs4_callback_compound() (git-fixes).\n- SUNRPC: Handle connection breakages correctly in call_status() (git-fixes).\n- UAS: Revert commit 3ae62a42090f ('UAS: fix alignment of scatter/gather segments').\n- USB: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- USB: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- USB: adutux: fix interface sanity check (bsc#1051510).\n- USB: adutux: fix use-after-free on disconnect (bsc#1142635).\n- USB: adutux: fix use-after-free on release (bsc#1051510).\n- USB: chaoskey: fix error case of a timeout (git-fixes).\n- USB: chaoskey: fix use-after-free on release (bsc#1051510).\n- USB: core: urb: fix URB structure initialization function (bsc#1051510).\n- USB: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- USB: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- USB: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- USB: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- USB: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- USB: gadget: pch_udc: fix use after free (bsc#1051510).\n- USB: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- USB: idmouse: fix interface sanity checks (bsc#1051510).\n- USB: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- USB: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- USB: iowarrior: fix use-after-free on release (bsc#1051510).\n- USB: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- USB: ldusb: fix control-message timeout (bsc#1051510).\n- USB: ldusb: fix memleak on disconnect (bsc#1051510).\n- USB: ldusb: fix read info leaks (bsc#1051510).\n- USB: ldusb: fix ring-buffer locking (bsc#1051510).\n- USB: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- USB: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- USB: legousbtower: fix memleak on disconnect (bsc#1051510).\n- USB: legousbtower: fix open after failed reset request (bsc#1142635).\n- USB: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- USB: legousbtower: fix slab info leak at probe (bsc#1142635).\n- USB: legousbtower: fix use-after-free on release (bsc#1051510).\n- USB: microtek: fix info-leak at probe (bsc#1142635).\n- USB: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n- USB: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n- USB: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- USB: serial: fix runtime PM after driver unbind (bsc#1051510).\n- USB: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- USB: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).\n- USB: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n- USB: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- USB: serial: mos7720: fix remote wakeup (git-fixes).\n- USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n- USB: serial: mos7840: fix remote wakeup (git-fixes).\n- USB: serial: option: add Telit FN980 compositions (bsc#1051510).\n- USB: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- USB: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n- USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n- USB: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- USB: storage: ums-realtek: Update module parameter description for auto_delink_en (bsc#1051510).\n- USB: storage: ums-realtek: Whitelist auto-delink support (bsc#1051510).\n- USB: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- USB: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- USB: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- USB: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- USB: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- USB: usbcore: Fix slab-out-of-bounds bug during device reset (bsc#1051510).\n- USB: usblcd: fix I/O after disconnect (bsc#1142635).\n- USB: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- USB: usblp: fix use-after-free on disconnect (bsc#1051510).\n- USB: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- USB: xhci: only set D3hot for pci device (bsc#1051510).\n- USB: yurex: Do not retry on unexpected errors (bsc#1051510).\n- USB: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- USBIP: add config dependency for SGL_ALLOC (git-fixes).\n- acpi/nfit, device-dax: Identify differentiated memory with a unique numa-node (bsc#1158071).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- alarmtimer: Use EOPNOTSUPP instead of ENOTSUPP (bsc#1151680).\n- apparmor: fix unsigned len comparison with less than zero (git-fixes).\n- appledisplay: fix error handling in the scheduled work (git-fixes).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- arm64/cpufeature: Convert hook_lock to raw_spin_lock_t in cpu_enable_ssbs() (jsc#ECO-561).\n- arm64: Add decoding macros for CP15_32 and CP15_64 traps (jsc#ECO-561).\n- arm64: Add part number for Neoverse N1 (jsc#ECO-561).\n- arm64: Add silicon-errata.txt entry for ARM erratum 1188873 (jsc#ECO-561).\n- arm64: Apply ARM64_ERRATUM_1188873 to Neoverse-N1 (jsc#ECO-561).\n- arm64: Fake the IminLine size on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix mismatched cache line size detection (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix silly typo in comment (jsc#ECO-561).\n- arm64: Force SSBS on context switch (jsc#ECO-561).\n- arm64: Handle erratum 1418040 as a superset of erratum 1188873 (jsc#ECO-561). \n- arm64: Introduce sysreg_clear_set() (jsc#ECO-561).\n- arm64: KVM: Add invalidate_icache_range helper (jsc#ECO-561,jsc#SLE-10671).\n- arm64: KVM: PTE/PMD S2 XN bit definition (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Make ARM64_ERRATUM_1188873 depend on COMPAT (jsc#ECO-561).\n- arm64: PCI: Preserve firmware configuration when desired (SLE-9332).\n- arm64: Restrict ARM64_ERRATUM_1188873 mitigation to AArch32 (jsc#ECO-561).\n- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n- arm64: arch_timer: Add workaround for ARM erratum 1188873 (jsc#ECO-561). \n- arm64: arch_timer: avoid unused function warning (jsc#ECO-561).\n- arm64: compat: Add CNTFRQ trap handler (jsc#ECO-561).\n- arm64: compat: Add CNTVCT trap handler (jsc#ECO-561).\n- arm64: compat: Add condition code checks and IT advance (jsc#ECO-561).\n- arm64: compat: Add cp15_32 and cp15_64 handler arrays (jsc#ECO-561).\n- arm64: compat: Add separate CP15 trapping hook (jsc#ECO-561).\n- arm64: compat: Workaround Neoverse-N1 #1542419 for compat user-space (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpu: Move errata and feature enable callbacks closer to callers (jsc#ECO-561).\n- arm64: cpu_errata: Remove ARM64_MISMATCHED_CACHE_LINE_SIZE (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Detect SSBS and advertise to userspace (jsc#ECO-561). \n- arm64: cpufeature: Fix handling of CTR_EL0.IDC field (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Trap CTR_EL0 access only where it is necessary (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: ctr: Fix cpu capability check for late CPUs (jsc#ECO-561,jsc#SLE-10671).\n- arm64: entry: Allow handling of undefined instructions from EL1 (jsc#ECO-561).\n- arm64: errata: Hide CTR_EL0.DIC on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: fix SSBS sanitization (jsc#ECO-561).\n- arm64: force_signal_inject: WARN if called from kernel context (jsc#ECO-561).\n- arm64: kill change_cpacr() (jsc#ECO-561).\n- arm64: kill config_sctlr_el1() (jsc#ECO-561).\n- arm64: move SCTLR_EL{1,2} assertions to asm/sysreg.h (jsc#ECO-561).\n- arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3 (jsc#ECO-561).\n- arm64: ssbd: Drop #ifdefs for PR_SPEC_STORE_BYPASS (jsc#ECO-561).\n- arm: KVM: Add optimized PIPT icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- ata: ep93xx: Use proper enums for directions (bsc#1051510).\n- ath10k: Correct error handling of dma_map_single() (bsc#1111666).\n- ath10k: adjust skb length in ath10k_sdio_mbox_rx_packet (bsc#1111666).\n- ath10k: allocate small size dma memory in ath10k_pci_diag_write_mem (bsc#1111666).\n- ath10k: assign 'n_cipher_suites = 11' for WCN3990 to enable WPA3 (bsc#1111666).\n- ath10k: avoid possible memory access violation (bsc#1111666).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: fix vdev-start timeout on error (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: skip resetting rx filter for WCN3990 (bsc#1111666).\n- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n- ath6kl: Fix off by one error in scan completion (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: dynack: fix possible deadlock in ath_dynack_node_{de}init (bsc#1051510).\n- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- ath9k_hw: fix uninitialized variable data (bsc#1051510).\n- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).\n- atm: iphase: Fix Spectre v1 vulnerability (networking-stable-19_08_08).\n- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n- bcma: fix incorrect update of BCMA_CORE_PCI_MDIO_DATA (bsc#1051510).\n- blk-flush: do not run queue for requests bypassing flush (bsc#1137959).\n- blk-flush: use blk_mq_request_bypass_insert() (bsc#1137959).\n- blk-mq-sched: decide how to handle flush rq via RQF_FLUSH_SEQ (bsc#1137959).\n- blk-mq: Fix memory leak in blk_mq_init_allocated_queue error handling (bsc#1151610).\n- blk-mq: backport fixes for blk_mq_complete_e_request_sync() (bsc#1145661).\n- blk-mq: do not allocate driver tag upfront for flush rq (bsc#1137959).\n- blk-mq: insert rq with DONTPREP to hctx dispatch list when requeue (bsc#1137959).\n- blk-mq: introduce blk_mq_complete_request_sync() (bsc#1145661).\n- blk-mq: introduce blk_mq_request_completed() (bsc#1149446).\n- blk-mq: introduce blk_mq_tagset_wait_completed_request() (bsc#1149446).\n- blk-mq: kABI fixes for blk-mq.h (bsc#1137959).\n- blk-mq: move blk_mq_put_driver_tag*() into blk-mq.h (bsc#1137959).\n- blk-mq: punt failed direct issue to dispatch list (bsc#1137959).\n- blk-mq: put the driver tag of nxt rq before first one is requeued (bsc#1137959).\n- blk-wbt: Avoid lock contention and thundering herd issue in wbt_wait (bsc#1141543).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: fix timeout changes for legacy request drivers (bsc#1149446).\n- block: kABI fixes for BLK_EH_DONE renaming (bsc#1142076).\n- block: rename BLK_EH_NOT_HANDLED to BLK_EH_DONE (bsc#1142076).\n- bnx2x: Disable multi-cos feature (networking-stable-19_08_08).\n- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).\n- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).\n- bnxt_en: Fix VNIC clearing logic for 57500 chips (bsc#1104745 ).\n- bnxt_en: Fix to include flow direction in L2 key (bsc#1104745 ).\n- bnxt_en: Improve RX doorbell sequence (bsc#1104745).\n- bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands (bsc#1104745).\n- bnxt_en: Update firmware interface spec. to 1.10.0.47 (bsc#1157115)\n- bnxt_en: Update firmware interface spec. to 1.10.0.89 (bsc#1157115)\n- bnxt_en: Update firmware interface to 1.10.0.69 (bsc#1157115)\n- bnxt_en: Use correct src_fid to determine direction of the flow (bsc#1104745).\n- bonding/802.3ad: fix link_failure_count tracking (bsc#1137069 bsc#1141013).\n- bonding/802.3ad: fix slave link initialization transition states (bsc#1137069 bsc#1141013).\n- bonding: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).\n- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).\n- bonding: set default miimon value for non-arp modes if not set (bsc#1137069 bsc#1141013).\n- bonding: speed/duplex update at NETDEV_UP event (bsc#1137069 bsc#1141013).\n- bpf, offload: Unlock on error in bpf_offload_dev_create() (bsc#1109837).\n- bpf/stackmap: Fix deadlock with rq_lock in bpf_get_stack() (bsc#1083647).\n- bpf: Fix use after free in subprog's jited symbol removal (bsc#1109837).\n- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).\n- bpf: fix BTF limits (bsc#1109837).\n- bpf: fix BTF verification of enums (bsc#1109837).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- bpf: skmsg, fix potential psock NULL pointer dereference (bsc#1109837).\n- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n- brcmfmac: fix wrong strnchr usage (bsc#1111666).\n- brcmfmac: increase buffer for obtaining firmware capabilities (bsc#1111666).\n- brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n- brcmfmac: sdio: Disable auto-tuning around commands expected to fail (bsc#1111666).\n- brcmfmac: sdio: Do not tune while the card is off (bsc#1111666).\n- brcmfmac: set F2 watermark to 256 for 4373 (bsc#1111666).\n- brcmfmac: set SDIO F1 MesBusyCtrl for CYW4373 (bsc#1111666).\n- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n- brcmsmac: Use kvmalloc() for ucode allocations (bsc#1111666).\n- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).\n- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).\n- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1152972).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: peak_usb: report bus recovery as well (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- ceph: use ceph_evict_inode to cleanup inode's resource (bsc#1148133).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n- cfg80211: validate wmm rule when setting (bsc#1111666).\n- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).\n- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n- cifs: handle netapp error codes (bsc#1136261).\n- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n- cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: at91: fix update bit maps on CFG_MOR write (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n- clk: sunxi-ng: v3s: add missing clock slices for MMC2 module clocks (bsc#1051510).\n- clk: sunxi-ng: v3s: add the missing PLL_DDR1 (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- config: arm64: enable erratum 1418040 and 1542419\n- configfs_register_group() shouldn't be (and isn't) called in rmdirable parts (bsc#1051510).\n- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).\n- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n- cpupower: Fix coredump on VMWare (bsc#1051510).\n- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n- crypto: af_alg - Fix race around ctx->rcvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: caam - fix concurrency issue in givencrypt descriptor (bsc#1051510).\n- crypto: caam - free resources in case caam_rng registration failed (bsc#1051510).\n- crypto: caam/qi - fix error handling in ERN handler (bsc#1111666).\n- crypto: cavium/zip - Add missing single_release() (bsc#1051510).\n- crypto: ccp - Reduce maximum stack usage (bsc#1051510).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n- crypto: dh - add public key verification test (bsc#1155331).\n- crypto: dh - fix calculating encoded key size (bsc#1155331).\n- crypto: dh - fix memory leak (bsc#1155331).\n- crypto: dh - update test for public key verification (bsc#1155331).\n- crypto: ecdh - add public key verification test (bsc#1155331).\n- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).\n- crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).\n- crypto: qat - Silence smp_processor_id() warning (bsc#1051510).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: skcipher - Unmap pages after an external error (bsc#1051510).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n- cx82310_eth: fix a memory leak bug (bsc#1051510).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: do not dma memory off of the stack (bsc#1152790).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127354 bsc#1127371).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).\n- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n- dlm: do not leak kernel pointer to userspace (bsc#1051510).\n- dlm: fix invalid free (bsc#1051510).\n- dma-buf/sw_sync: Synchronize signal vs syncpt free (bsc#1111666).\n- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: dw: platform: Switch to acpi_dma_controller_register() (bsc#1051510).\n- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n- dmaengine: iop-adma.c: fix printk format warning (bsc#1051510).\n- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n- docs: move protection-keys.rst to the core-api book (bsc#1078248).\n- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).\n- drivers/regulator: fix a missing check of return value (bsc#1051510).\n- drivers: thermal: int340x_thermal: Fix sysfs race condition (bsc#1051510).\n- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)\n- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).\n- drm/amd/display: fix odm combine pipe reset (bsc#1111666).\n- drm/amd/display: reprogram VM config when system resume (bsc#1111666).\n- drm/amd/display: support spdif (bsc#1111666).\n- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported (bsc#1113956)\n- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).\n- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).\n- drm/amdgpu/powerplay/vega10: allow undervolting in p7 (bsc#1111666).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Add APTX quirk for Dell Latitude 5495 (bsc#1142635)\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).\n- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1111666).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)\n- drm/amdgpu: fix memory leak (bsc#1111666).\n- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).\n- drm/amdkfd: fix a use after free race with mmu_notifer unregister (bsc#1154048)\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/atomic_helper: Allow DPMS On/Off changes for unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/cml: Add second PCH ID for CMP (bsc#1111666).\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915/gvt: fix dropping obj reference twice (bsc#1111666).\n- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)\n- drm/i915/ilk: Fix warning when reading emon_status with no output (bsc#1111666).\n- drm/i915/pmu: 'Frequency' is reported as accumulated cycles (bsc#1112178)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).\n- drm/i915: Disable Secure Batches for gen6+ (bsc#1135967)\n- drm/i915: Do not deballoon unused ggtt drm_mm_node in linux guest (bsc#1142635)\n- drm/i915: Do not dereference request if it may have been retired when (bsc#1142635)\n- drm/i915: Fix and improve MCR selection logic (bsc#1112178)\n- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).\n- drm/i915: Fix various tracepoints for gen2 (bsc#1113722)\n- drm/i915: Lock the engine while dumping the active request (bsc#1142635)\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Reacquire priolist cache after dropping the engine lock (bsc#1129770)\n- drm/i915: Remove Master tables from cmdparser (bsc#1135967)\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Restore relaxed padding (OCL_OOB_SUPPRES_ENABLE) for skl+ (bsc#1142635)\n- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).\n- drm/i915: Skip modeset for cdclk changes if possible (bsc#1156928).\n- drm/i915: Support ro ppgtt mapped cmdparser shadow (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/imx: Drop unused imx-ipuv3-crtc.o build (bsc#1113722)\n- drm/mediatek: set DMA max segment size (bsc#1111666).\n- drm/msm/dpu: handle failures while initializing displays (bsc#1111666).\n- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/msm/dsi: Implement reset correctly (bsc#1154048)\n- drm/msm: fix memleak on release (bsc#1111666).\n- drm/msm: include linux/sched/task.h (bsc#1112178)\n- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).\n- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)\n- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/panel: check failure cases in the probe func (bsc#1111666).\n- drm/panel: make drm_panel.h self-contained (bsc#1111666).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).\n- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)\n- drm/stm: attach gem fence to atomic state (bsc#1111666).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm: add __user attribute to ptr_to_compat() (bsc#1111666).\n- drm: fix module name in edid_firmware log message (bsc#1113956)\n- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)\n- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).\n- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).\n- e1000e: Add support for Comet Lake (bsc#1158533).\n- e1000e: Add support for Tiger Lake (bsc#1158533).\n- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n- e1000e: Increase pause and refresh time (bsc#1158533).\n- e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- e100: Fix passing zero to 'PTR_ERR' warning in e100_load_ucode_wait (bsc#1051510).\n- ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable (bsc#1158646).\n- ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either (bsc#1158647).\n- eeprom: at24: make spd world-readable again (git-fixes).\n- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).\n- efi/memattr: Do not bail on zero VA if it equals the region's PA (bsc#1051510).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- ext4: fix punch hole for inline_data file systems (bsc#1158640).\n- ext4: fix warning inside ext4_convert_unwritten_extents_endio (bsc#1152025).\n- ext4: set error return correctly when ext4_htree_store_dirent fails (bsc#1152024).\n- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- fix SCTP regression (bsc#1158082)\n- floppy: fix usercopy direction (bsc#1111666).\n- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n- gpio: Move gpiochip_lock/unlock_as_irq to gpio/driver.h (bsc#1051510).\n- gpio: fix line flag validation in lineevent_create (bsc#1051510).\n- gpio: fix line flag validation in linehandle_create (bsc#1051510).\n- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and blacklist (bsc#1051510).\n- gpiolib: only check line handle flags once (bsc#1051510).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).\n- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n- hwmon: (lm75) Fix write operations for negative temperatures (bsc#1051510).\n- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n- hwmon: (shtc1) fix shtc1 and shtw1 id mask (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- hypfs: Fix error number left in struct pointer member (bsc#1051510).\n- i2c: designware: Synchronize IRQs when unregistering slave client (bsc#1111666).\n- i2c: emev2: avoid race when unregistering slave client (bsc#1051510).\n- i2c: of: Try to find an I2C adapter matching the parent (bsc#1129770)\n- i2c: piix4: Fix port selection for AMD Family 16h Model 30h (bsc#1051510).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- i40e: Add support for X710 device (bsc#1151067).\n- i40e: enable X710 support (bsc#1151067).\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Do not process reset during or after device removal (bsc#1149652 ltc#179635).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ice: fix potential infinite loop because loop counter being too small (bsc#1118661).\n- ice: fix stack leakage (bsc#1118661).\n- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ife: error out when nla attributes are empty (networking-stable-19_08_08).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: dac: ad5380: fix incorrect assignment to val (bsc#1051510).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- intel_th: Fix a double put_device() in error path (git-fixes).\n- intel_th: pci: Add Tiger Lake support (bsc#1051510).\n- intel_th: pci: Add support for another Lewisburg PCH (bsc#1051510).\n- iomap: Fix pipe page leakage during splicing (bsc#1158651).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Fix race in increase_address_space() (bsc#1150860).\n- iommu/amd: Flush old domains in kdump kernel (bsc#1150861).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain->updated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- iommu/dma: Fix for dereferencing before null checking (bsc#1151667).\n- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151662).\n- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151671).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n- iommu: Do not use sme_active() in generic code (bsc#1151661).\n- ip6_tunnel: fix possible use-after-free on xmit (networking-stable-19_08_08).\n- ipmi: Do not allow device module unload when in use (bsc#1154768).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).\n- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).\n- ipv6/addrconf: allow adding multicast addr if IFA_F_MCAUTOJOIN is set (networking-stable-19_08_28).\n- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- irqchip/gic-v2m: Add support for Amazon Graviton variant of GICv3+GICv2m (SLE-9332).\n- irqchip/gic-v3-its: Fix LPI release for Multi-MSI devices (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix command queue pointer comparison bug (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix misuse of GENMASK macro (jsc#ECO-561).\n- irqdomain: Add the missing assignment of domain->fwnode for named fwnode (bsc#1111666).\n- isdn/capi: check message length in capi_write() (bsc#1051510).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: check kasprintf() return value (bsc#1051510).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- iwlwifi: drop packets with bad status in CD (bsc#1111666).\n- iwlwifi: exclude GEO SAR support for 3168 (bsc#1111666).\n- iwlwifi: fix bad dma handling in page_mem dumping flow (bsc#1120902).\n- iwlwifi: fw: do not send GEO_TX_POWER_LIMIT command to FW version 36 (bsc#1111666).\n- iwlwifi: fw: use helper to determine whether to dump paging (bsc#1106434). Patch needed to be adjusted, because our tree does not have the global variable IWL_FW_ERROR_DUMP_PAGING\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n- iwlwifi: mvm: force TCM re-evaluation on TCM resume (bsc#1111666).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- iwlwifi: mvm: use correct FIFO length (bsc#1111666).\n- iwlwifi: pcie: fit reclaim msg to MAX_MSG_LEN (bsc#1111666).\n- iwlwifi: pcie: fix erroneous print (bsc#1111666).\n- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).\n- iwlwifi: pcie: read correct prph address for newer devices (bsc#1111666).\n- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 ).\n- ixgbe: fix possible deadlock in ixgbe_service_task() (bsc#1113994).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 ).\n- kABI fix for 'ipmi: Do not allow device module unload when in use' (bsc#1154768).\n- kABI fixup alloc_dax_region (bsc#1158071).\n- kABI workaround for ath10k hw_filter_reset_required field (bsc#1111666).\n- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_connector.registered type changes (bsc#1111666).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for iwlwifi iwl_rx_cmd_buffer change (bsc#1111666).\n- kABI workaround for mmc_host retune_crc_disable flag addition (bsc#1111666).\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n- kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).\n- kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n- kABI: media: em28xx: fix handler for vidioc_s_input() (bsc#1051510). fixes kABI\n- kABI: media: em28xx: stop rewriting device's struct (bsc#1051510). fixes kABI\n- kabi protect enum RDMA_DRIVER_EFA (jsc#SLE-4805)\n- kabi/severities: Whitelist a couple of xive functions xive_cleanup_irq_data and xive_native_populate_irq_data are exported by the xive interupt controller driver and used by KVM. I do not expect any out-of-tree driver can sanely use these.\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can't be expected of OOT code.\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kabi: s390: struct subchannel (git-fixes).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). \n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n- kexec: bail out upon SIGKILL when allocating memory (git-fixes).\n- keys: Fix missing null pointer check in request_key_auth_describe() (bsc#1051510).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- lan78xx: Fix memory leaks (bsc#1051510).\n- leds: leds-lp5562 allow firmware files up to the maximum length (bsc#1051510).\n- leds: trigger: gpio: GPIO 0 is valid (bsc#1051510).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- libertas_tf: Use correct channel range in lbtf_geo_init (bsc#1051510).\n- libiscsi: do not try to bypass SCSI EH (bsc#1142076).\n- libnvdimm/altmap: Track namespace boundaries in altmap (bsc#1150305).\n- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).\n- libnvdimm: Export the target_node attribute for regions and namespaces (bsc#1158071).\n- libnvdimm: prevent nvdimm from requesting key when security is disabled (bsc#1137982).\n- lightnvm: remove dependencies on BLK_DEV_NVME and PCI (bsc#1150846).\n- liquidio: add cleanup in octeon_setup_iq() (bsc#1051510).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n- livepatch: Basic API to track system state changes (bsc#1071995 ).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n- livepatch: Nullify obj->mod in klp_module_coming()'s error path (bsc#1071995).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n- loop: add ioctl for changing logical block size (bsc#1108043).\n- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).\n- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).\n- lpfc: Add additional discovery log messages (bsc#1154521).\n- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).\n- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).\n- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).\n- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).\n- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).\n- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).\n- lpfc: Make FW logging dynamically configurable (bsc#1154521).\n- lpfc: Remove lock contention target write path (bsc#1154521).\n- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).\n- lpfc: Slight fast-path Performance optimizations (bsc#1154521).\n- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).\n- lpfc: fix coverity error of dereference after null check (bsc#1154521).\n- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).\n- lpfc: size cpu map by last cpu id set (bsc#1157160).\n- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n- mac80211: fix station inactive_time shortly after boot (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n- mac80211: minstrel_ht: fix per-group max throughput rate initialization (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- macvlan: schedule bc_work even if error (bsc#1051510).\n- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).\n- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- md/raid6: Set R5_ReadError when there is read failure on parity disk (git-fixes).\n- md: do not report active array_state until after revalidate_disk() completes (git-fixes).\n- md: only call set_in_sync() when it is expected to succeed (git-fixes).\n- media: Revert '[media] marvell-ccic: reset ccic phy when stop streaming for stability' (bsc#1051510).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: atmel: atmel-isi: fix timeout value for stop streaming (bsc#1051510).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: bdisp: fix memleak on release (git-fixes).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: dib0700: fix link error for dibx000_i2c_set_speed (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: em28xx: fix handler for vidioc_s_input() (bsc#1051510).\n- media: em28xx: stop rewriting device's struct (bsc#1051510).\n- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: fdp1: Reduce FCP not found message level to debug (bsc#1051510).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n- media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n- media: marvell-ccic: do not generate EOF on parallel bus (bsc#1051510).\n- media: mc-device.c: do not memset __user pointer contents (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov6650: Fix control handler not freed on init error (git-fixes).\n- media: ov6650: Fix sensor possibly not detected on probe (bsc#1051510).\n- media: ov6650: Move v4l2_clk_get() to ov6650_video_probe() helper (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: radio: wl1273: fix interrupt masking on release (git-fixes).\n- media: replace strcpy() by strscpy() (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: technisat-usb2: break out of loop at end of buffer (bsc#1051510).\n- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n- media: tm6000: double free if usb disconnect while streaming (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n- media: uvcvideo: Fix error path in control parsing failure (git-fixes).\n- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).\n- media: vb2: Fix videobuf2 to map correct area (bsc#1051510).\n- media: vim2m: Fix abort issue (git-fixes).\n- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n- mei: bus: prefix device names on bus with the bus name (bsc#1051510).\n- mei: fix modalias documentation (git-fixes).\n- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).\n- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n- mic: avoid statically declaring a 'struct device' (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n- mlxsw: spectrum_flower: Fail in case user specifies multiple mirror actions (bsc#1112374).\n- mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel (bsc#1112374).\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).\n- mm, page_owner, debug_pagealloc: save and dump freeing stack trace (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: decouple freeing stack trace from debug_pagealloc (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: fix off-by-one error in __set_page_owner_handle() (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: keep owner info when freeing the page (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: make init_pages_in_zone() faster (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: record page owner for each subpage (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: rename flag indicating that page is allocated (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).\n- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n- mm/memcontrol.c: fix use after free in mem_cgroup_iter() (bsc#1149224, VM Functionality).\n- mmc: core: API to temporarily disable retuning for SDIO CRC errors (bsc#1111666).\n- mmc: core: Add sdio_retune_hold_now() and sdio_retune_release() (bsc#1111666).\n- mmc: core: Fix init of SD cards reporting an invalid VDD range (bsc#1051510).\n- mmc: core: fix wl1251 sdio quirks (git-fixes).\n- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n- mmc: sdhci-msm: fix mutex while in spinlock (bsc#1142635).\n- mmc: sdhci-of-arasan: Do now show error message in case of deffered probe (bsc#1119086).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdhci-of-esdhc: Revert 'mmc: sdhci-of-esdhc: add erratum A-009204 support' (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- mmc: sdio: fix wl1251 vendor id (git-fixes).\n- moduleparam: fix parameter description mismatch (bsc#1051510).\n- mqprio: Fix out-of-bounds access in mqprio_dump (bsc#1109837).\n- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n- mt76x0: init hw capabilities.\n- mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI RCU Schedule Stall (bsc#1051510).\n- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n- mvpp2: refactor MTU change code (networking-stable-19_08_08).\n- mwifex: free rx_cmd skb in suspended state (bsc#1111666).\n- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).\n- mwifiex: do no submit URB in suspended state (bsc#1111666).\n- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).\n- nbd: prevent memory leak (bsc#1158638).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/ibmvnic: Fix missing { in __ibmvnic_reset (bsc#1149652 ltc#179635).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/ibmvnic: free reset work of removed device from queue (bsc#1149652 ltc#179635).\n- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).\n- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).\n- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n- net/mlx4_en: Fix wrong limitation for number of TX rings (bsc#1103989).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Accumulate levels for chains prio namespaces (bsc#1103990).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: FWTrace, Reduce stack usage (bsc#1103990).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/mlx5: Update the list of the PCI supported devices (bsc#1127611).\n- net/mlx5: Use reversed order when unregister devices (networking-stable-19_08_08).\n- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n- net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 ).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 ).\n- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n- net/mlx5e: Only support tx/rx pause setting for port owner (networking-stable-19_08_21).\n- net/mlx5e: Print a warning when LRO feature is dropped or not allowed (bsc#1103990).\n- net/mlx5e: Query global pause state before setting prio2buffer (bsc#1103990).\n- net/mlx5e: Use flow keys dissector to parse packets for ARFS (networking-stable-19_08_21).\n- net/packet: fix race in tpacket_snd() (networking-stable-19_08_21).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net/sched: cbs: Fix not adding cbs instance to list (bsc#1109837).\n- net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate (bsc#1109837).\n- net/smc: Fix error path in smc_init (git-fixes).\n- net/smc: avoid fallback in case of non-blocking connect (git-fixes).\n- net/smc: do not schedule tx_work in SMC_CLOSED state (git-fixes).\n- net/smc: fix SMCD link group creation with VLAN id (git-fixes).\n- net/smc: fix closing of fallback SMC sockets (git-fixes).\n- net/smc: fix ethernet interface refcounting (git-fixes).\n- net/smc: fix fastopen for non-blocking connect() (git-fixes).\n- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).\n- net/smc: fix refcounting for non-blocking connect() (git-fixes).\n- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).\n- net/smc: make sure EPOLLOUT is raised (networking-stable-19_08_28).\n- net/smc: original socket family in inet_sock_diag (bsc#1149959).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).\n- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n- net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).\n- net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).\n- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n- net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).\n- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n- net: dsa: fix switch tree list (networking-stable-19_11_05).\n- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).\n- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n- net: fix ifindex collision during namespace removal (networking-stable-19_08_08).\n- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n- net: hns3: Add missing newline at end of file (bsc#1104353 ).\n- net: hns3: add Asym Pause support to fix autoneg problem (bsc#1104353).\n- net: hns3: add a check to pointer in error_detected and slot_reset (bsc#1104353).\n- net: hns3: add aRFS support for PF (bsc#1104353).\n- net: hns3: add all IMP return code (bsc#1104353).\n- net: hns3: add check to number of buffer descriptors (bsc#1104353).\n- net: hns3: add default value for tc_size and tc_offset (bsc#1104353).\n- net: hns3: add exception handling when enable NIC HW error interrupts (bsc#1104353).\n- net: hns3: add handling of two bits in MAC tunnel interrupts (bsc#1104353).\n- net: hns3: add handshake with hardware while doing reset (bsc#1104353).\n- net: hns3: add opcode about query and clear RAS and MSI-X to special opcode (bsc#1104353).\n- net: hns3: add recovery for the H/W errors occurred before the HNS dev initialization (bsc#1104353).\n- net: hns3: add some error checking in hclge_tm module (bsc#1104353).\n- net: hns3: add support for dump firmware statistics by debugfs (bsc#1104353).\n- net: hns3: adjust hns3_uninit_phy()'s location in the hns3_client_uninit() (bsc#1104353).\n- net: hns3: bitwise operator should use unsigned type (bsc#1104353).\n- net: hns3: change GFP flag during lock period (bsc#1104353 ).\n- net: hns3: change SSU's buffer allocation according to UM (bsc#1104353).\n- net: hns3: check msg_data before memcpy in hclgevf_send_mbx_msg (bsc#1104353).\n- net: hns3: clear restting state when initializing HW device (bsc#1104353).\n- net: hns3: code optimizaition of hclge_handle_hw_ras_error() (bsc#1104353).\n- net: hns3: delay and separate enabling of NIC and ROCE HW errors (bsc#1104353).\n- net: hns3: delay ring buffer clearing during reset (bsc#1104353 ).\n- net: hns3: delay setting of reset level for hw errors until slot_reset is called (bsc#1104353).\n- net: hns3: delete the redundant user NIC codes (bsc#1104353 ).\n- net: hns3: do not configure new VLAN ID into VF VLAN table when it's full (bsc#1104353).\n- net: hns3: do not query unsupported commands in debugfs (bsc#1104353).\n- net: hns3: enable DCB when TC num is one and pfc_en is non-zero (bsc#1104353).\n- net: hns3: enable broadcast promisc mode when initializing VF (bsc#1104353).\n- net: hns3: extract handling of mpf/pf msi-x errors into functions (bsc#1104353).\n- net: hns3: fix ETS bandwidth validation bug (bsc#1104353 ).\n- net: hns3: fix GFP flag error in hclge_mac_update_stats() (bsc#1126390).\n- net: hns3: fix VLAN filter restore issue after reset (bsc#1104353).\n- net: hns3: fix __QUEUE_STATE_STACK_XOFF not cleared issue (bsc#1104353).\n- net: hns3: fix a -Wformat-nonliteral compile warning (bsc#1104353).\n- net: hns3: fix a memory leak issue for hclge_map_unmap_ring_to_vf_vector (bsc#1104353).\n- net: hns3: fix a statistics issue about l3l4 checksum error (bsc#1104353).\n- net: hns3: fix avoid unnecessary resetting for the H/W errors which do not require reset (bsc#1104353).\n- net: hns3: fix compile warning without CONFIG_RFS_ACCEL (bsc#1104353).\n- net: hns3: fix dereference of ae_dev before it is null checked (bsc#1104353).\n- net: hns3: fix flow control configure issue for fibre port (bsc#1104353).\n- net: hns3: fix for dereferencing before null checking (bsc#1104353).\n- net: hns3: fix for skb leak when doing selftest (bsc#1104353 ).\n- net: hns3: fix race conditions between reset and module loading and unloading (bsc#1104353).\n- net: hns3: fix some coding style issues (bsc#1104353 ).\n- net: hns3: fix some reset handshake issue (bsc#1104353 ).\n- net: hns3: fix wrong size of mailbox responding data (bsc#1104353).\n- net: hns3: fixes wrong place enabling ROCE HW error when loading (bsc#1104353).\n- net: hns3: free irq when exit from abnormal branch (bsc#1104353 ).\n- net: hns3: handle empty unknown interrupt (bsc#1104353 ).\n- net: hns3: initialize CPU reverse mapping (bsc#1104353 ).\n- net: hns3: log detail error info of ROCEE ECC and AXI errors (bsc#1104353).\n- net: hns3: make HW GRO handling compliant with SW GRO (bsc#1104353).\n- net: hns3: modify handling of out of memory in hclge_err.c (bsc#1104353).\n- net: hns3: modify hclge_init_client_instance() (bsc#1104353 ).\n- net: hns3: modify hclgevf_init_client_instance() (bsc#1104353 ).\n- net: hns3: optimize the CSQ cmd error handling (bsc#1104353 ).\n- net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353 bsc#1134983).\n- net: hns3: process H/W errors occurred before HNS dev initialization (bsc#1104353).\n- net: hns3: re-schedule reset task while VF reset fail (bsc#1104353).\n- net: hns3: refactor PF/VF RSS hash key configuration (bsc#1104353).\n- net: hns3: refactor hns3_get_new_int_gl function (bsc#1104353 ).\n- net: hns3: refine the flow director handle (bsc#1104353 ).\n- net: hns3: remove RXD_VLD check in hns3_handle_bdinfo (bsc#1104353).\n- net: hns3: remove VF VLAN filter entry inexistent warning print (bsc#1104353).\n- net: hns3: remove override_pci_need_reset (bsc#1104353 ).\n- net: hns3: remove redundant core reset (bsc#1104353 ).\n- net: hns3: remove setting bit of reset_requests when handling mac tunnel interrupts (bsc#1104353).\n- net: hns3: remove unused linkmode definition (bsc#1104353 ).\n- net: hns3: replace numa_node_id with numa_mem_id for buffer reusing (bsc#1104353).\n- net: hns3: set default value for param 'type' in hclgevf_bind_ring_to_vector (bsc#1104353).\n- net: hns3: set maximum length to resp_data_len for exceptional case (bsc#1104353).\n- net: hns3: set ops to null when unregister ad_dev (bsc#1104353 ).\n- net: hns3: set the port shaper according to MAC speed (bsc#1104353).\n- net: hns3: small changes for magic numbers (bsc#1104353 ).\n- net: hns3: some changes of MSI-X bits in PPU(RCB) (bsc#1104353 ).\n- net: hns3: some modifications to simplify and optimize code (bsc#1104353).\n- net: hns3: some variable modification (bsc#1104353).\n- net: hns3: stop schedule reset service while unloading driver (bsc#1104353).\n- net: hns3: sync VLAN filter entries when kill VLAN ID failed (bsc#1104353).\n- net: hns3: trigger VF reset if a VF had an over_8bd_nfe_err (bsc#1104353).\n- net: hns3: typo in the name of a constant (bsc#1104353 ).\n- net: hns3: use HCLGEVF_STATE_NIC_REGISTERED to indicate VF NIC client has registered (bsc#1104353).\n- net: hns3: use HCLGE_STATE_NIC_REGISTERED to indicate PF NIC client has registered (bsc#1104353).\n- net: hns3: use HCLGE_STATE_ROCE_REGISTERED to indicate PF ROCE client has registered (bsc#1104353).\n- net: hns3: use macros instead of magic numbers (bsc#1104353 ).\n- net: hns: Fix the stray netpoll locks causing deadlock in NAPI path (bsc#1104353).\n- net: hns: add support for vlan TSO (bsc#1104353).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: phy: Check against net_device being NULL (bsc#1051510).\n- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).\n- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).\n- net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 ).\n- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).\n- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: marvell: clear wol event before setting it (bsc#1051510).\n- net: phy: meson-gxl: check phy_write return value (bsc#1051510).\n- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: mscc: read 'vsc8531, edge-slowdown' as an u32 (bsc#1051510).\n- net: phy: mscc: read 'vsc8531,vddmac' as an u32 (bsc#1051510).\n- net: phy: xgene: disable clk on error paths (bsc#1051510).\n- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).\n- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).\n- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).\n- net: phylink: Fix flow control resolution (bsc#1119113 ).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net: sched: Fix a possible null-pointer dereference in dequeue_func() (networking-stable-19_08_08).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: sched: cbs: Avoid division by zero when calculating the port rate (bsc#1109837).\n- net: sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key (bsc#1109837).\n- net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues (bsc#1109837).\n- net: sched: fix possible crash in tcf_action_destroy() (bsc#1109837).\n- net: sched: fix reordering issues (bsc#1109837).\n- net: sock_map, fix missing ulp check in sock hash case (bsc#1109837).\n- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).\n- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: netlink: fix double device reference drop (git-fixes).\n- nfc: port100: handle command failure cleanly (git-fixes).\n- nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs (bsc#1109837).\n- nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs (bsc#1109837).\n- nfsd: Do not release the callback slot unless it was actually held (git-fixes).\n- nfsd: Fix overflow causing non-working mounts on 1 TB machines (bsc#1150381).\n- nfsd: degraded slot-count more gracefully as allocation nears exhaustion (bsc#1150381).\n- nfsd: fix performance-limiting session calculation (bsc#1150381).\n- nfsd: give out fewer session slots as limit approaches (bsc#1150381).\n- nfsd: handle drc over-allocation gracefully (bsc#1150381).\n- nfsd: increase DRC cache limit (bsc#1150381).\n- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- null_blk: complete requests from ->timeout (bsc#1149446).\n- null_blk: wire up timeouts (bsc#1149446).\n- nvme-fc: fix module unloads while lports still pending (bsc#1150033).\n- nvme-multipath: relax ANA state check (bsc#1123105).\n- nvme-rdma: Allow DELETING state change failure in (bsc#1104967,).\n- nvme-rdma: centralize admin/io queue teardown sequence (bsc#1142076).\n- nvme-rdma: centralize controller setup sequence (bsc#1142076).\n- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-rdma: fix timeout handler (bsc#1149446).\n- nvme-rdma: fix timeout handler (bsc#1149446).\n- nvme-rdma: remove redundant reference between ib_device and tagset (bsc#149446).\n- nvme-rdma: stop admin queue before freeing it (bsc#1140155).\n- nvme-rdma: support up to 4 segments of inline data (bsc#1142076).\n- nvme-rdma: unquiesce queues when deleting the controller (bsc#1142076).\n- nvme-rdma: use dynamic dma mapping per command (bsc#1149446).\n- nvme-tcp: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-tcp: fix timeout handler (bsc#1149446).\n- nvme-tcp: support C2HData with SUCCESS flag (bsc#1157386).\n- nvme: cancel request synchronously (bsc#1145661).\n- nvme: do not abort completed request in nvme_cancel_request (bsc#1149446).\n- nvme: fix multipath crash when ANA is deactivated (bsc#1149446).\n- nvme: remove ns sibling before clearing path (bsc#1140155).\n- nvme: return BLK_EH_DONE from ->timeout (bsc#1142076).\n- nvme: wait until all completed request's complete fn is called (bsc#1149446).\n- nvmem: Use the same permissions for eeprom as for nvmem (git-fixes).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n- ocfs2: fix passing zero to 'PTR_ERR' warning (bsc#1158649).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- openvswitch: fix flow command message size (git-fixes).\n- pNFS/flexfiles: Turn off soft RPC calls (git-fixes).\n- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n- perf/x86/amd: Change/fix NMI latency mitigation to use a timestamp (bsc#1142924).\n- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n- phy: renesas: rcar-gen3-usb2: Disable clearing VBUS in over-current (bsc#1051510).\n- phylink: fix kernel-doc warnings (bsc#1111666).\n- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).\n- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).\n- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC227E to critclk_systems DMI table (bsc#1051510).\n- pnfs/flexfiles: Fix PTR_ERR() dereferences in ff_layout_track_ds_error (git-fixes).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: reset: gpio-restart: Fix typo when gpio reset is not found (bsc#1051510).\n- power: supply: Init device wakeup after device_add() (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/64: Make sys_switch_endian() traceable (bsc#1065729).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: Fix MADV_[FREE|DONTNEED] TLB flush miss problem with THP (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Fix memory hot-unplug page table split (bsc#1065729).\n- powerpc/64s/radix: Fix memory hotplug section page table creation (bsc#1065729).\n- powerpc/64s/radix: Implement _tlbie(l)_va_range flush functions (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Improve TLB flushing for page table freeing (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Improve preempt handling in TLB code (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Introduce local single page ceiling for TLB range\n- powerpc/64s/radix: Optimize flush_tlb_range (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n- powerpc/book3s64/mm: Do not do tlbie fixup for some hardware revisions (bsc#1152161 ltc#181664).\n- powerpc/book3s64/radix: Rename CPU_FTR_P9_TLBIE_BUG feature flag (bsc#1152161 ltc#181664).\n- powerpc/bpf: Fix tail call implementation (bsc#1157698).\n- powerpc/bpf: use unsigned division instruction for 64-bit operations (bsc#1065729).\n- powerpc/irq: Do not WARN continuously in arch_local_irq_restore() (bsc#1065729).\n- powerpc/irq: drop arch_early_irq_init() (bsc#1065729).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm/radix: Drop unneeded NULL check (bsc#1152161 ltc#181664).\n- powerpc/mm/radix: implement LPID based TLB flushes to be used by KVM (bsc#1152161 ltc#181664).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm: Fixup tlbie vs mtpidr/mtlpidr ordering issue on POWER9 (bsc#1152161 ltc#181664).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm: Simplify page_is_ram by using memblock_is_memory (bsc#1065729).\n- powerpc/mm: Use memblock API for PPC32 page_is_ram (bsc#1065729).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/module64: Fix comment in R_PPC64_ENTRY handling (bsc#1065729).\n- powerpc/powernv/ioda2: Allocate TCE table levels on demand for default DMA window (bsc#1061840).\n- powerpc/powernv/ioda: Fix race in TCE level allocation (bsc#1061840).\n- powerpc/powernv/npu: Remove obsolete comment about TCE_KILL_INVAL_ALL (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/powernv: Fix compile without CONFIG_TRACEPOINTS (bsc#1065729).\n- powerpc/powernv: Flush console before platform error reboot (bsc#1149940 ltc#179958).\n- powerpc/powernv: Restrict OPAL symbol map to only be readable by root (bsc#1152885).\n- powerpc/powernv: Use kernel crash path for machine checks (bsc#1149940 ltc#179958).\n- powerpc/powernv: move OPAL call wrapper tracing and interrupt handling to C (bsc#1065729).\n- powerpc/pseries, ps3: panic flush kernel messages before halting system (bsc#1149940 ltc#179958).\n- powerpc/pseries/memory-hotplug: Fix return value type of find_aa_index (bsc#1065729).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Call H_BLOCK_REMOVE when supported (bsc#1109158).\n- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n- powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init() (git-fixes).\n- powerpc/pseries: Export maximum memory value (bsc#1122363).\n- powerpc/pseries: Export raw per-CPU VPA data via debugfs ().\n- powerpc/pseries: Fix cpu_hotplug_lock acquisition in resize_hpt() (bsc#1065729).\n- powerpc/pseries: Read TLB Block Invalidate Characteristics (bsc#1109158).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n- powerpc/pseries: correctly track irq state in default idle (bsc#1150727 ltc#178925).\n- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n- powerpc/ptrace: Simplify vr_get/set() to avoid GCC warning (bsc#1148868).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/xive: Fix bogus error code returned by OPAL (bsc#1065729).\n- powerpc/xive: Implement get_irqchip_state method for XIVE to fix shutdown race (bsc#1065729).\n- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n- powerpc/xmon: Fix opcode being uninitialized in print_insn_powerpc (bsc#1065729).\n- powerpc: Drop page_is_ram() and walk_system_ram_range() (bsc#1065729).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- powerpc: bpf: Fix generation of load/store DW instructions (bsc#1065729).\n- powerpc: dump kernel log before carrying out fadump or kdump (bsc#1149940 ltc#179958).\n- powerplay: Respect units on max dcfclk watermark (bsc#1111666).\n- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n- ppp: Fix memory leak in ppp_write (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- printk/panic: Avoid deadlock in printk() after stopping CPUs by NMI (bsc#1148712).\n- printk: Do not lose last line in kmsg buffer dump (bsc#1152460).\n- printk: Export console_printk (bsc#1071995).\n- printk: fix printk_time race (bsc#1152466).\n- pwm: Clear chip_data in pwm_put() (bsc#1051510).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- pwm: clps711x: Fix period calculation (bsc#1051510).\n- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).\n- qla2xxx: kABI fixes for v10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- qla2xxx: remove SGI SN2 support (bsc#1123034 bsc#1131304 bsc#1127988).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- quota: fix wrong condition in is_quota_modification() (bsc#1152026).\n- qxl: fix null-pointer crash during suspend (bsc#1111666).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- r8152: Set memory to all 0xFFs on failed reg reads (bsc#1051510).\n- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n- random: move FIPS continuous test to output functions (bsc#1155334).\n- rds: Fix warning (bsc#1154848).\n- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n- regulator: lm363x: Fix off-by-one n_voltages for lm3632 ldo_vpos/ldo_vneg (bsc#1051510).\n- regulator: tps65910: fix a missing check of return value (bsc#1051510).\n- reiserfs: fix extended attributes on the root directory (bsc#1151225).\n- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).\n- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_ops kerneldoc comment (bsc#1051510).\n- resource: fix locking in find_next_iomem_res() (bsc#1114279).\n- rpm/config.sh: Enable kgraft.\n- rpm/config.sh: Enable livepatch.\n- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.\n- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: remove code duplicated by merge.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages\n- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/kernel-subpackage-spec: Unify dependency handling.\n- rpm/kernel-subpackage-spec: fix kernel-default-base build There were some issues with recent changes to subpackage dependencies handling:\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm/modules.fips: update module list (bsc#1157853)\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with '.ko' which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize '.ko.xz' in addition to '.ko'.\n- rt2800: remove errornous duplicate condition (git-fixes).\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtl818x: fix potential use after free (bsc#1051510).\n- rtlwifi: Fix file release memory leak (bsc#1111666).\n- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n- rtlwifi: btcoex: Use proper enumerated types for Wi-Fi only interface (bsc#1111666).\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing callback that tests for hw release of buffer (bsc#1111666).\n- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n- s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n- s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n- s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n- s390/cio: fix virtio-ccw DMA without PV (git-fixes).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- s390/idle: fix cpu idle time calculation (bsc#1051510).\n- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n- s390/pci: add mio_enabled attribute (bsc#1152665 LTC#181729).\n- s390/pci: correctly handle MIO opt-out (bsc#1152665 LTC#181729).\n- s390/pci: deal with devices that have no support for MIO instructions (bsc#1152665 LTC#181729).\n- s390/pci: fix MSI message data (bsc#1152697 LTC#181730).\n- s390/process: avoid potential reading of freed stack (bsc#1051510).\n- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n- s390/qeth: clean up page frag creation (git-fixes).\n- s390/qeth: consolidate skb allocation (git-fixes).\n- s390/qeth: ensure linear access to packet headers (git-fixes).\n- s390/qeth: guard against runt packets (git-fixes).\n- s390/qeth: return proper errno on IO error (bsc#1051510).\n- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n- s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n- s390/zcrypt: fix memleak at release (git-fixes).\n- s390: add support for IBM z15 machines (bsc#1152696 LTC#181731).\n- s390: fix setting of mio addressing control (bsc#1152665 LTC#181729).\n- s390: fix stfle zero padding (bsc#1051510).\n- s390: vfio-ccw: Do not attempt to free no-op, test and tic cda (bsc#1154244).\n- s390: vsie: Use effective CRYCBD.31 to check CRYCBD validity (git-fixes).\n- sc16is7xx: Fix for 'Unexpected interrupt: 8' (bsc#1051510).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- sched/fair: Add tmp_alone_branch assertion (bnc#1156462).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).\n- sched/fair: Fix insertion in rq->leaf_cfs_rq_list (bnc#1156462).\n- sched/fair: Optimize update_blocked_averages() (bnc#1156462).\n- sched/fair: WARN() and refuse to set buddy when !se->on_rq (bsc#1158132).\n- scripts/arch-symbols: add missing link.\n- scripts/git_sort/git_sort.py:\n- scripts/run_oldconfig.sh: Fix update-vanilla When CC is set we want to use it for native only. Cross-compilation still needs the crosscompilers. flush (bsc#1055117 bsc#1152161 ltc#181664).\n- scsi: bfa: convert to strlcpy/strlcat (git-fixes).\n- scsi: cxlflash: Prevent deadlock when adapter probe fails (git-fixes).\n- scsi: lpfc: Add enablement of multiple adapter dumps (bsc#1154601).\n- scsi: lpfc: Add registration for CPU Offline/Online events (bsc#1154601).\n- scsi: lpfc: Change default IRQ model on AMD architectures (bsc#1154601).\n- scsi: lpfc: Check queue pointer before use (bsc#1154242).\n- scsi: lpfc: Clarify FAWNN error message (bsc#1154601).\n- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).\n- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).\n- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).\n- scsi: lpfc: Fix NULL check before mempool_destroy is not needed (bsc#1154601).\n- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).\n- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_get_sgl_per_hdwq() (bsc#1154601).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_sli4_enable_intr() (bsc#1154601).\n- scsi: lpfc: Fix configuration of BB credit recovery in service parameters (bsc#1154601).\n- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).\n- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).\n- scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow (bsc#1154601).\n- scsi: lpfc: Fix dynamic fw log enablement check (bsc#1154601).\n- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).\n- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).\n- scsi: lpfc: Fix kernel crash at lpfc_nvme_info_show during remote port bounce (bsc#1154601).\n- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).\n- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).\n- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).\n- scsi: lpfc: Fix lpfc_cpumask_of_node_init() (bsc#1154601).\n- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).\n- scsi: lpfc: Fix reset recovery paths that are not recovering (bsc#1144375).\n- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).\n- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).\n- scsi: lpfc: Fix unexpected error messages during RSCN handling (bsc#1154601).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1154601).\n- scsi: lpfc: Initialize cpu_map for not present cpus (bsc#1154601).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).\n- scsi: lpfc: Make lpfc_debugfs_ras_log_data static (bsc#1154601).\n- scsi: lpfc: Mitigate high memory pre-allocation by SCSI-MQ (bsc#1154601).\n- scsi: lpfc: Raise config max for lpfc_fcp_mq_threshold variable (bsc#1154601).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: Resolve checker warning for lpfc_new_io_buf() (bsc#1144375).\n- scsi: lpfc: Sync with FC-NVMe-2 SLER change to require Conf with SLER (bsc#1154601).\n- scsi: lpfc: Update async event logging (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.6.0.1 (bsc#1154601).\n- scsi: lpfc: Update lpfc version to 12.6.0.2 (bsc#1154601).\n- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).\n- scsi: lpfc: fix build error of lpfc_debugfs.c for vfree/vmalloc (bsc#1154601).\n- scsi: lpfc: fix inlining of lpfc_sli4_cleanup_poll_list() (bsc#1154601).\n- scsi: lpfc: fix spelling error in MAGIC_NUMER_xxx (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_get_scsi_buf_s3(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: lpfc_attr: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: lpfc_nvmet: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: lpfc: revise nvme max queues to be hdwq count (bsc#1154601).\n- scsi: lpfc: use hdwq assigned cpu for allocation (bsc#1157160).\n- scsi: qedf: Add debug information for unsolicited processing (bsc#1149976).\n- scsi: qedf: Add shutdown callback handler (bsc#1149976).\n- scsi: qedf: Add support for 20 Gbps speed (bsc#1149976).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1149976).\n- scsi: qedf: Check for link state before processing LL2 packets and send fipvlan retries (bsc#1149976).\n- scsi: qedf: Check for module unloading bit before processing link update AEN (bsc#1149976).\n- scsi: qedf: Decrease the LL2 MTU size to 2500 (bsc#1149976).\n- scsi: qedf: Fix race betwen fipvlan request and response path (bsc#1149976).\n- scsi: qedf: Initiator fails to re-login to switch after link down (bsc#1149976).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qedf: Print message during bailout conditions (bsc#1149976).\n- scsi: qedf: Stop sending fipvlan request on unload (bsc#1149976).\n- scsi: qedf: Update module description string (bsc#1149976).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1149976).\n- scsi: qedf: Update the version to 8.42.3.0 (bsc#1149976).\n- scsi: qedf: Use discovery list to traverse rports (bsc#1149976).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: remove set but not used variables (bsc#1149976).\n- scsi: qedi: remove declaration of nvm_image from stack (git-fixes).\n- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add new FW dump template entry types (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add pci function reset support (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add protection mask module parameters (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add support for setting port speed (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Allow NVMe IO to resume with short cable pull (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Always check the qla2x00_wait_for_hba_online() return value (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Always check the qla2x00_wait_for_hba_online() return value (bsc#1143706).\n- scsi: qla2xxx: Avoid PCI IRQ affinity mapping when multiqueue is not supported (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that Coverity complains about dereferencing a NULL rport pointer (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that lockdep complains about unsafe locking in tcm_qla2xxx_close_session() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that qla2x00_mem_free() crashes if called twice (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Change abort wait_loop from msleep to wait_event_timeout (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change data_dsd into an array (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change data_dsd into an array (bsc#1143706).\n- scsi: qla2xxx: Change default ZIO threshold (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Change the return type of qla24xx_read_flash_data() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla24xx_read_flash_data() (bsc#1143706).\n- scsi: qla2xxx: Change the return type of qla2x00_update_ms_fdmi_iocb() into void (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla2x00_update_ms_fdmi_iocb() into void (bsc#1143706).\n- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check secondary image if reading the primary image fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check secondary image if reading the primary image fails (bsc#1143706).\n- scsi: qla2xxx: Check the PCI info string output buffer size (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check the PCI info string output buffer size (bsc#1143706).\n- scsi: qla2xxx: Check the size of firmware data structures at compile time (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanup fcport memory to prevent leak (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a command is released that is owned by the firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a mailbox command times out (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a mailbox command times out (bsc#1143706).\n- scsi: qla2xxx: Complain if a soft reset fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a soft reset fails (bsc#1143706).\n- scsi: qla2xxx: Complain if parsing the version string fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if parsing the version string fails (bsc#1143706).\n- scsi: qla2xxx: Complain if sp->done() is not called from the completion path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if sp->done() is not called from the completion path (bsc#1143706).\n- scsi: qla2xxx: Complain if waiting for pending commands times out (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if waiting for pending commands times out (bsc#1143706).\n- scsi: qla2xxx: Complain loudly about reference count underflow (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Correct error handling during initialization failures (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correctly retrieve and interpret active flash region (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Declare fourth qla2x00_set_model_info() argument const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare fourth qla2x00_set_model_info() argument const (bsc#1143706).\n- scsi: qla2xxx: Declare local symbols static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla24xx_build_scsi_crc_2_iocbs() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla2x00_find_new_loop_id() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla_tgt_cmd.cdb const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla_tgt_cmd.cdb const (bsc#1143706).\n- scsi: qla2xxx: Declare the fourth ql_dump_buffer() argument const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare the fourth ql_dump_buffer() argument const (bsc#1143706).\n- scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not corrupt vha->plogi_ack_list (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Do not corrupt vha->plogi_ack_list (bsc#1143706).\n- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Downgrade driver to 10.01.00.19-k There are upstream bug reports against 10.01.00.19-k which haven't been resolved. Also the newer version failed to get a proper review. For time being it's better to got with the older version and do not introduce new bugs.\n- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Enable type checking for the SRB free and done callback functions (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Enable type checking for the SRB free and done callback functions (bsc#1143706).\n- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix DMA unmap leak (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix NULL pointer crash due to stale CPUID (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NVME cmd and LS cmd timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NVMe port discovery after a short device port loss (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix Nport ID display value (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix Relogin to prevent modifying scan_state flag (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix SRB allocation flag to avoid sleeping in IRQ context (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix a NULL pointer dereference (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a NULL pointer dereference (bsc#1143706).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix a qla24xx_enable_msix() error path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a race condition between aborting and completing a SCSI command (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a race condition between aborting and completing a SCSI command (bsc#1143706).\n- scsi: qla2xxx: Fix a recently introduced kernel warning (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a small typo in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix abort timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix comment alignment in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix different size DMA Alloc/Unmap (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver reload for ISP82xx (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix driver reload for ISP82xx (bsc#1143706).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload when FC-NVMe LUNs are connected (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix flash read for Qlogic ISPs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix flash read for Qlogic ISPs (bsc#1143706).\n- scsi: qla2xxx: Fix formatting of pointer types (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix fw dump corruption (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix fw options handle eh_bus_reset() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix gnl.l memory leak on adapter init failure (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hang in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hardirq-unsafe locking (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hardlockup in abort command during driver remove (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix kernel crash after disconnecting NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix message indicating vectors used by driver (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix message indicating vectors used by driver (bsc#1143706).\n- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix possible fcport null-pointer dereferences (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix premature timer expiration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix qla24xx_process_bidir_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix qla24xx_process_bidir_cmd() (bsc#1143706).\n- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix race conditions in the code for aborting SCSI commands (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session cleanup hang (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session lookup in qlt_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session lookup in qlt_abort_work() (bsc#1143706).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stale session (bsc#1143706).\n- scsi: qla2xxx: Fix stuck login session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stuck login session (bsc#1143706).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix use-after-free issues in qla2xxx_qpair_sp_free_dma() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Further limit FLASH region write access from SysFS (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Improve Linux kernel coding style conformance (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve Linux kernel coding style conformance (bsc#1143706).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Include the asm/unaligned.h header file from qla_dsd.h (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Include the asm/unaligned.h header file from qla_dsd.h (bsc#1143706).\n- scsi: qla2xxx: Increase the max_sgl_segments to 1024 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Increase the size of the mailbox arrays from 4 to 8 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Inline the qla2x00_fcport_event_handler() function (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Inline the qla2x00_fcport_event_handler() function (bsc#1143706).\n- scsi: qla2xxx: Insert spaces where required (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2x00_els_dcmd2_free() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2x00_els_dcmd2_free() (bsc#1143706).\n- scsi: qla2xxx: Introduce qla2xxx_get_next_handle() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2xxx_get_next_handle() (bsc#1143706).\n- scsi: qla2xxx: Introduce the be_id_t and le_id_t data types for FC src/dst IDs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the be_id_t and le_id_t data types for FC src/dst IDs (bsc#1143706).\n- scsi: qla2xxx: Introduce the dsd32 and dsd64 data structures (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Introduce the dsd32 and dsd64 data structures (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the function qla2xxx_init_sp() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the function qla2xxx_init_sp() (bsc#1143706).\n- scsi: qla2xxx: Leave a blank line after declarations (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Let the compiler check the type of the SCSI command context pointer (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Let the compiler check the type of the SCSI command context pointer (bsc#1143706).\n- scsi: qla2xxx: Log the status code if a firmware command fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make it explicit that ELS pass-through IOCBs use little endian (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make it explicit that ELS pass-through IOCBs use little endian (bsc#1143706).\n- scsi: qla2xxx: Make qla24xx_async_abort_cmd() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_abort_srb() again decrease the sp reference count (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_abort_srb() again decrease the sp reference count (bsc#1143706).\n- scsi: qla2xxx: Make qla2x00_mem_free() easier to verify (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_process_response_queue() easier to read (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qlt_handle_abts_completion() more robust (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qlt_handle_abts_completion() more robust (bsc#1143706).\n- scsi: qla2xxx: Make sure that aborted commands are freed (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make sure that aborted commands are freed (bsc#1143706).\n- scsi: qla2xxx: Modify NVMe include directives (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Modify NVMe include directives (bsc#1143706).\n- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move marker request behind QPair (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_clear_loop_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_is_reserved_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_set_fcport_state() from a .h into a .c file (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_set_reserved_loop_ids() definition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move the linux/io-64-nonatomic-lo-hi.h include directive (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move the port_state_str definition from a .h to a .c file (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Pass little-endian values to the firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent memory leak for CT req/rsp allocation (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (bsc#1143706).\n- scsi: qla2xxx: Reduce the number of casts in GID list code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the number of casts in GID list code (bsc#1143706).\n- scsi: qla2xxx: Reduce the number of forward declarations (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the scope of three local variables in qla2xxx_queuecommand() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the scope of three local variables in qla2xxx_queuecommand() (bsc#1143706).\n- scsi: qla2xxx: Reject EH_{abort|device_reset|target_request} (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove FW default template (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove a comment that refers to the SCSI host lock (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous forward declaration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous forward declaration (bsc#1143706).\n- scsi: qla2xxx: Remove a superfluous pointer check (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous pointer check (bsc#1143706).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Remove an include directive from qla_mr.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove an include directive from qla_mr.c (bsc#1143706).\n- scsi: qla2xxx: Remove dead code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove dead code (bsc#1143706).\n- scsi: qla2xxx: Remove qla_tgt_cmd.data_work and qla_tgt_cmd.data_work_free (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove qla_tgt_cmd.released (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove set but not used variable 'ptr_dma' (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove superfluous sts_entry_* casts (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove superfluous sts_entry_* casts (bsc#1143706).\n- scsi: qla2xxx: Remove the fcport test from qla_nvme_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous casts (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous if-tests (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous if-tests (bsc#1143706).\n- scsi: qla2xxx: Remove two superfluous tests (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous tests (bsc#1143706).\n- scsi: qla2xxx: Remove unnecessary locking from the target code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unnecessary null check (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unreachable code from qla83xx_idc_lock() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unreachable code from qla83xx_idc_lock() (bsc#1143706).\n- scsi: qla2xxx: Remove useless set memory to zero use memset() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Replace vmalloc + memset with vzalloc (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report invalid mailbox status codes (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report invalid mailbox status codes (bsc#1143706).\n- scsi: qla2xxx: Report the firmware status code if a mailbox command fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report the firmware status code if a mailbox command fails (bsc#1143706).\n- scsi: qla2xxx: Reset the FCF_ASYNC_{SENT|ACTIVE} flags (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Restore FAWWPN of Physical Port only for loop down (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Retry fabric Scan on IOCB queue full (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Rework key encoding in qlt_find_host_by_d_id() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Rework key encoding in qlt_find_host_by_d_id() (bsc#1143706).\n- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set the SCSI command result before calling the command done (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the qpair in SRB to NULL when SRB is released (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the responder mode if appropriate for ELS pass-through IOCBs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the responder mode if appropriate for ELS pass-through IOCBs (bsc#1143706).\n- scsi: qla2xxx: Silence Successful ELS IOCB message (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify a debug statement (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify a debug statement (bsc#1143706).\n- scsi: qla2xxx: Simplify conditional check again (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_abort_sp_done() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_abort_sp_done() (bsc#1143706).\n- scsi: qla2xxx: Simplify qla24xx_async_abort_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_async_abort_cmd() (bsc#1143706).\n- scsi: qla2xxx: Simplify qlt_lport_dump() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qlt_lport_dump() (bsc#1143706).\n- scsi: qla2xxx: Simplify qlt_send_term_imm_notif() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Skip FW dump on LOOP initialization error (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress a Coveritiy complaint about integer overflow (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress a Coveritiy complaint about integer overflow (bsc#1143706).\n- scsi: qla2xxx: Suppress multiple Coverity complaint about out-of-bounds accesses (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress multiple Coverity complaint about out-of-bounds accesses (bsc#1143706).\n- scsi: qla2xxx: Uninline qla2x00_init_timer() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Unregister resources in the opposite order of the registration order (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.00.00.13-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.16-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.19-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.19-k (bsc#1143706).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Update flash read/write routine (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use ARRAY_SIZE() in the definition of QLA_LAST_SPEED (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use Correct index for Q-Pair array (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use __le64 instead of uint32_t for sending DMA addresses to firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use __le64 instead of uint32_t[2] for sending DMA addresses to firmware (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Use an on-stack completion in qla24xx_control_vp() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use common update-firmware-options routine for ISP27xx+ (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use complete switch scan for RSCN events (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use correct number of vectors for online CPUs (bsc#1137223).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Use get/put_unaligned where appropriate (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use memcpy() and strlcpy() instead of strcpy() and strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use memcpy() and strlcpy() instead of strcpy() and strncpy() (bsc#1143706).\n- scsi: qla2xxx: Use mutex protection during qla2x00_sysfs_read_fw_dump() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use strlcpy() instead of strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use strlcpy() instead of strncpy() (bsc#1143706).\n- scsi: qla2xxx: Use tabs instead of spaces for indentation (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use tabs instead of spaces for indentation (bsc#1143706).\n- scsi: qla2xxx: Use tabs to indent code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Verify locking assumptions at runtime (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Verify locking assumptions at runtime (bsc#1143706).\n- scsi: qla2xxx: allow session delete to finish before create (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: avoid printf format warning (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: check for kstrtol() failure (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: cleanup trace buffer initialization (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: cleanup trace buffer initialization (bsc#1134476).\n- scsi: qla2xxx: deadlock by configfs_depend_item (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: fix fcport null pointer access (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n- scsi: qla2xxx: fix spelling mistake 'alredy' -> 'already' (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix spelling mistake 'initializatin' -> 'initialization' (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: flush IO on chip reset or sess delete (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: move IO flush to the front of NVME rport unregistration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: on session delete, return nvme cmd (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: qla2x00_alloc_fw_dump: set ha->eft (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: remove double assignment in qla2x00_update_fcport (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: target: Fix offline port handling and host reset handling (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n- scsi: scsi_transport_fc: nvme: display FC-NVMe port roles (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: sd: Defer spinning up drive while SANITIZE is in progress (git-fixes).\n- scsi: sd: Fix a race between closing an sd device and sd I/O (git-fixes).\n- scsi: sd: Fix cache_type_store() (git-fixes).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: sd: Optimal I/O size should be a multiple of physical block size (git-fixes).\n- scsi: sd: Quiesce warning if device does not report optimal I/O size (git-fixes).\n- scsi: sd_zbc: Fix potential memory leak (git-fixes).\n- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: tcm_qla2xxx: Minimize #include directives (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: ufs: fix wrong command type of UTRD for UFSHCI v2.1 (git-fixes).\n- scsi: use dma_get_cache_alignment() as minimum DMA alignment (git-fixes).\n- scsi: virtio_scsi: do not send sc payload with tmfs (git-fixes).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n- scsi: zfcp: trace channel log even for FCP command responses (git-fixes).\n- scsi_transport_fc: complete requests from ->timeout (bsc#1142076).\n- sctp: Fix regression (bsc#1158082).\n- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).\n- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n- sctp: fix the transport error_count check (networking-stable-19_08_21).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: max310x: Fix tx_empty() callback (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- series.conf: Move iommu patches into sorted section.\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sky2: Disable MSI on yet another ASUS boards (P6Xxxx) (bsc#1051510).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: Fix use-after-free Read in slip_open (bsc#1051510).\n- slip: make slhc_free() silently accept an error pointer (bsc#1051510).\n- slip: sl_alloc(): remove unused parameter 'dev_t line' (bsc#1051510).\n- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n- smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).\n- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- spi: atmel: Fix CS high support (bsc#1051510).\n- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n- spi: bcm2835aux: fix corruptions for longer spi transfers (bsc#1051510).\n- spi: bcm2835aux: remove dangerous uncontrolled read of fifo (bsc#1051510).\n- spi: bcm2835aux: unifying code between polling and interrupt driven code (bsc#1051510).\n- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#1051510).\n- spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch (bsc#1051510).\n- spi: omap2-mcspi: Set FIFO DMA trigger level to word length (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it's not ours (bsc#1111666).\n- spi: spidev: Fix OF tree warning logic (bsc#1051510).\n- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- staging: rtl8192e: fix potential use after free (bsc#1051510).\n- staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids (bsc#1051510).\n- staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme->key_idx >= NUM_WEPKEYS (bsc#1051510).\n- stm class: Fix a double free of stm_source_device (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- supported.conf:\n- supported.conf: Mark vfio_ccw supported by SUSE, because bugs can be routed to IBM via SUSE support (jsc#SLE-6138, bsc#1151192).\n- synclink_gt(): fix compat_ioctl() (bsc#1051510).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: make sure EPOLLOUT wont be missed (networking-stable-19_08_28).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n- team: Add vlan tx offload to hw_enc_features (bsc#1051510).\n- team: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).\n- temporarily disable debug_pagealloc (bsc#1159096).\n- thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: check msg->req data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n- tipc: compat: allow tipc commands without arguments (bsc#1051510).\n- tipc: fix a missing check of genlmsg_put (bsc#1051510).\n- tipc: fix link name length check (bsc#1051510).\n- tipc: fix link name length check (git-fixes).\n- tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).\n- tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).\n- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n- tipc: handle the err returned from cmd header function (bsc#1051510).\n- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n- tipc: tipc clang warning (bsc#1051510).\n- tools/power/x86/intel-speed-select: Fix a read overflow in isst_set_tdp_level_msr() (bsc#1111666).\n- tools: bpftool: close prog FD before exit on showing a single program (bsc#1109837).\n- tools: bpftool: fix arguments for p_err() in do_event_pipe() (bsc#1109837).\n- tools: bpftool: fix error message (prog -> object) (bsc#1109837).\n- tpm: add check after commands attribs tab allocation (bsc#1051510).\n- tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts (bsc#1082555).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tty: serial: fsl_lpuart: Use appropriate lpuart32_* I/O funcs (bsc#1111666).\n- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: msm_serial: Fix flow control (bsc#1051510).\n- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n- tun: fix data-race in gro_normal_list() (bsc#1111666).\n- tun: fix use-after-free when register netdev failed (bsc#1111666).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- uaccess: Add non-pagefault user-space write function (bsc#1083647).\n- ubifs: Correctly initialize c->min_log_bytes (bsc#1158641).\n- ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n- usb-storage: Add new JMS567 revision to unusual_devs (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 ('usb-storage: Set virt_boundary_mask to avoid SG overflows') (bsc#1051510).\n- usb: chipidea: Fix otg event handler (bsc#1051510).\n- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- usb: chipidea: udc: do not do hardware access if gadget has stopped (bsc#1051510).\n- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n- usb: gadget: composite: Clear 'suspended' on reset/disconnect (bsc#1051510).\n- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- usb: handle warm-reset port requests on hub resume (bsc#1051510).\n- usb: host: fotg2: restart hcd after port reset (bsc#1051510).\n- usb: host: ohci: fix a race condition between shutdown and irq (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usbip: Fix free of unallocated memory in vhci tx (git-fixes).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n- usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n- vfio: ccw: fix bad ptr math for TIC cda translation (bsc#1154244).\n- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1 (bsc#1051510).\n- vhost/test: fix build for vhost test (bsc#1111666).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video/hdmi: Fix AVI bar unpack (git-fixes).\n- video: backlight: Add devres versions of of_find_backlight (bsc#1090888) Taken for 6010831dde5.\n- video: backlight: Add of_find_backlight helper in backlight.c (bsc#1090888) Taken for 6010831dde5.\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- video: ssd1307fb: Start page range at page_offset (bsc#1113722)\n- video: ssd1307fb: Start page range at page_offset (bsc#1152446)\n- virtio/s390: fix race on airq_areas (bsc#1051510).\n- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n- virtio_ring: fix return code on DMA mapping fails (git-fixes).\n- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: bcm2835_wdt: Fix module autoload (bsc#1051510).\n- watchdog: fix compile time error of pretimeout governors (bsc#1051510).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n- watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).\n- wcn36xx: use dynamic allocation for large variables (bsc#1111666).\n- wil6210: drop Rx multicast packets that are looped-back to STA (bsc#1111666).\n- wil6210: fix L2 RX status handling (bsc#1111666).\n- wil6210: fix RGF_CAF_ICR address for Talyn-MB (bsc#1111666).\n- wil6210: fix debugfs memory access alignment (bsc#1111666).\n- wil6210: fix freeing of rx buffers in EDMA mode (bsc#1111666).\n- wil6210: fix invalid memory access for rx_buff_mgmt debugfs (bsc#1111666).\n- wil6210: fix locking in wmi_call (bsc#1111666).\n- wil6210: prevent usage of tx ring 0 for eDMA (bsc#1111666).\n- wil6210: set edma variables only for Talyn-MB devices (bsc#1111666).\n- wimax/i2400m: fix a memory leak bug (bsc#1051510).\n- x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16h (bsc#1114279).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/entry/64/compat: Fix stack switching for XEN PV (bsc#1108382).\n- x86/fpu: Add FPU state copying quirk to handle XRSTOR failure on Intel Skylake CPUs (bsc#1151955).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- x86/pkeys: Update documentation about availability (bsc#1078248).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).\n- x86/tls: Fix possible spectre-v1 in do_get_thread_area() (bsc#1114279).\n- xdp: unpin xdp umem pages in error path (bsc#1109837).\n- xen-netfront: do not assume sk_buff_head list is empty in error handling (bsc#1065600).\n- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (bsc#1065600).\n- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n- xen/netback: Reset nr_frags before freeing skb (networking-stable-19_08_21).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xen/xenbus: fix self-deadlock after killing user process (bsc#1065600).\n- xfrm: Fix xfrm sel prefix length validation (git-fixes).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xsk: Fix registration of Rx-only sockets (bsc#1109837).\n- xsk: avoid store-tearing when assigning queues (bsc#1111666).\n- xsk: avoid store-tearing when assigning umem (bsc#1111666).\n- xsk: relax UMEM headroom alignment (bsc#1109837).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2020-93,SUSE-SLE-SERVER-12-SP5-2020-93", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0093-1.json", }, { category: "self", summary: "URL for SUSE-SU-2020:0093-1", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2020:0093-1", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html", }, { category: "self", summary: "SUSE Bug 1046299", url: "https://bugzilla.suse.com/1046299", }, { category: "self", summary: "SUSE Bug 1046303", url: "https://bugzilla.suse.com/1046303", }, { category: "self", summary: "SUSE Bug 1046305", url: "https://bugzilla.suse.com/1046305", }, { category: "self", summary: "SUSE Bug 1048942", url: "https://bugzilla.suse.com/1048942", }, { category: "self", summary: "SUSE Bug 1050244", url: "https://bugzilla.suse.com/1050244", }, { category: "self", summary: "SUSE Bug 1050536", url: "https://bugzilla.suse.com/1050536", }, { category: "self", summary: "SUSE Bug 1050545", url: "https://bugzilla.suse.com/1050545", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1055186", url: "https://bugzilla.suse.com/1055186", }, { category: "self", summary: "SUSE Bug 1061840", url: "https://bugzilla.suse.com/1061840", }, { category: "self", summary: "SUSE Bug 1064802", url: "https://bugzilla.suse.com/1064802", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1066129", url: "https://bugzilla.suse.com/1066129", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1073513", url: "https://bugzilla.suse.com/1073513", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1082555", url: "https://bugzilla.suse.com/1082555", }, { category: "self", summary: "SUSE Bug 1082635", url: "https://bugzilla.suse.com/1082635", }, { category: "self", summary: "SUSE Bug 1083647", url: "https://bugzilla.suse.com/1083647", }, { category: "self", summary: "SUSE Bug 1086323", url: "https://bugzilla.suse.com/1086323", }, { category: "self", summary: "SUSE Bug 1087092", url: "https://bugzilla.suse.com/1087092", }, { category: "self", summary: "SUSE Bug 1089644", url: "https://bugzilla.suse.com/1089644", }, { category: "self", summary: "SUSE Bug 1090631", url: "https://bugzilla.suse.com/1090631", }, { category: "self", summary: "SUSE Bug 1090888", url: "https://bugzilla.suse.com/1090888", }, { category: "self", summary: "SUSE Bug 1091041", url: "https://bugzilla.suse.com/1091041", }, { category: "self", summary: "SUSE Bug 1093205", url: "https://bugzilla.suse.com/1093205", }, { category: "self", summary: "SUSE Bug 1096254", url: "https://bugzilla.suse.com/1096254", }, { category: "self", summary: "SUSE Bug 1097583", url: "https://bugzilla.suse.com/1097583", }, { category: "self", summary: "SUSE Bug 1097584", url: "https://bugzilla.suse.com/1097584", }, { category: "self", summary: "SUSE Bug 1097585", url: "https://bugzilla.suse.com/1097585", }, { category: "self", summary: "SUSE Bug 1097586", url: "https://bugzilla.suse.com/1097586", }, { category: "self", summary: "SUSE Bug 1097587", url: "https://bugzilla.suse.com/1097587", }, { category: "self", summary: "SUSE Bug 1097588", url: "https://bugzilla.suse.com/1097588", }, { category: "self", summary: "SUSE Bug 1098291", url: "https://bugzilla.suse.com/1098291", }, { category: "self", summary: "SUSE Bug 1101674", url: "https://bugzilla.suse.com/1101674", }, { category: "self", summary: "SUSE Bug 1103989", url: "https://bugzilla.suse.com/1103989", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103991", url: "https://bugzilla.suse.com/1103991", }, { category: "self", summary: "SUSE Bug 1104353", url: "https://bugzilla.suse.com/1104353", }, { category: "self", summary: "SUSE Bug 1104427", url: "https://bugzilla.suse.com/1104427", }, { category: "self", summary: "SUSE Bug 1104745", url: "https://bugzilla.suse.com/1104745", }, { category: "self", summary: "SUSE Bug 1104967", url: "https://bugzilla.suse.com/1104967", }, { category: "self", summary: "SUSE Bug 1106434", url: "https://bugzilla.suse.com/1106434", }, { category: "self", summary: "SUSE Bug 1108043", url: "https://bugzilla.suse.com/1108043", }, { category: "self", summary: "SUSE Bug 1108382", url: "https://bugzilla.suse.com/1108382", }, { category: "self", summary: "SUSE Bug 1109158", url: "https://bugzilla.suse.com/1109158", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1111666", url: "https://bugzilla.suse.com/1111666", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1113956", url: "https://bugzilla.suse.com/1113956", }, { category: "self", summary: "SUSE Bug 1113994", url: "https://bugzilla.suse.com/1113994", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1115026", url: "https://bugzilla.suse.com/1115026", }, { category: "self", summary: "SUSE Bug 1117169", url: "https://bugzilla.suse.com/1117169", }, { category: "self", summary: "SUSE Bug 1117665", url: "https://bugzilla.suse.com/1117665", }, { category: "self", summary: "SUSE Bug 1118661", url: "https://bugzilla.suse.com/1118661", }, { category: "self", summary: "SUSE Bug 1119086", url: "https://bugzilla.suse.com/1119086", }, { category: "self", summary: "SUSE Bug 1119113", url: "https://bugzilla.suse.com/1119113", }, { category: "self", summary: "SUSE Bug 1119461", url: "https://bugzilla.suse.com/1119461", }, { category: "self", summary: "SUSE Bug 1119465", url: "https://bugzilla.suse.com/1119465", }, { category: "self", summary: "SUSE Bug 1120853", url: "https://bugzilla.suse.com/1120853", }, { category: "self", summary: "SUSE Bug 1120902", url: "https://bugzilla.suse.com/1120902", }, { category: "self", summary: "SUSE Bug 1122363", url: "https://bugzilla.suse.com/1122363", }, { category: "self", summary: "SUSE Bug 1123034", url: "https://bugzilla.suse.com/1123034", }, { category: "self", summary: "SUSE Bug 1123080", url: "https://bugzilla.suse.com/1123080", }, { category: "self", summary: "SUSE Bug 1123105", url: "https://bugzilla.suse.com/1123105", }, { category: "self", summary: "SUSE Bug 1126206", url: "https://bugzilla.suse.com/1126206", }, { category: "self", summary: "SUSE Bug 1126390", url: "https://bugzilla.suse.com/1126390", }, { category: "self", summary: "SUSE Bug 1127155", url: "https://bugzilla.suse.com/1127155", }, { category: "self", summary: "SUSE Bug 1127354", url: "https://bugzilla.suse.com/1127354", }, { category: "self", summary: "SUSE Bug 1127371", url: "https://bugzilla.suse.com/1127371", }, { category: "self", summary: "SUSE Bug 1127611", url: "https://bugzilla.suse.com/1127611", }, { category: "self", summary: "SUSE Bug 1127988", url: "https://bugzilla.suse.com/1127988", }, { category: "self", summary: "SUSE Bug 1129770", url: "https://bugzilla.suse.com/1129770", }, { category: "self", summary: "SUSE Bug 1131107", url: "https://bugzilla.suse.com/1131107", }, { category: "self", summary: "SUSE Bug 1131304", url: "https://bugzilla.suse.com/1131304", }, { category: "self", summary: "SUSE Bug 1131489", url: "https://bugzilla.suse.com/1131489", }, { category: "self", summary: "SUSE Bug 1133140", url: "https://bugzilla.suse.com/1133140", }, { category: "self", summary: "SUSE Bug 1134476", url: "https://bugzilla.suse.com/1134476", }, { category: "self", summary: "SUSE Bug 1134973", url: "https://bugzilla.suse.com/1134973", }, { category: "self", summary: "SUSE Bug 1134983", url: "https://bugzilla.suse.com/1134983", }, { category: "self", summary: "SUSE Bug 1135642", url: "https://bugzilla.suse.com/1135642", }, { category: "self", summary: "SUSE Bug 1135854", url: "https://bugzilla.suse.com/1135854", }, { category: "self", summary: "SUSE Bug 1135873", url: "https://bugzilla.suse.com/1135873", }, { category: "self", summary: "SUSE Bug 1135966", url: "https://bugzilla.suse.com/1135966", }, { category: "self", summary: "SUSE Bug 1135967", url: "https://bugzilla.suse.com/1135967", }, { category: "self", summary: "SUSE Bug 1136261", url: "https://bugzilla.suse.com/1136261", }, { category: "self", summary: "SUSE Bug 1137040", url: "https://bugzilla.suse.com/1137040", }, { category: "self", summary: "SUSE Bug 1137069", url: "https://bugzilla.suse.com/1137069", }, { category: "self", summary: "SUSE Bug 1137223", url: "https://bugzilla.suse.com/1137223", }, { category: "self", summary: "SUSE Bug 1137236", url: "https://bugzilla.suse.com/1137236", }, { category: "self", summary: "SUSE Bug 1137799", url: "https://bugzilla.suse.com/1137799", }, { category: "self", summary: "SUSE Bug 1137861", url: "https://bugzilla.suse.com/1137861", }, { category: "self", summary: "SUSE Bug 1137865", url: "https://bugzilla.suse.com/1137865", }, { category: "self", summary: "SUSE Bug 1137959", url: "https://bugzilla.suse.com/1137959", }, { category: "self", summary: "SUSE Bug 1137982", url: "https://bugzilla.suse.com/1137982", }, { category: "self", summary: "SUSE Bug 1138039", url: "https://bugzilla.suse.com/1138039", }, { category: "self", summary: "SUSE Bug 1138190", url: "https://bugzilla.suse.com/1138190", }, { category: "self", summary: "SUSE Bug 1139073", url: "https://bugzilla.suse.com/1139073", }, { category: "self", summary: "SUSE Bug 1140090", url: "https://bugzilla.suse.com/1140090", }, { category: "self", summary: "SUSE Bug 1140155", url: "https://bugzilla.suse.com/1140155", }, { category: "self", summary: "SUSE Bug 1140729", url: "https://bugzilla.suse.com/1140729", }, { category: "self", summary: "SUSE Bug 1140845", url: "https://bugzilla.suse.com/1140845", }, { category: "self", summary: "SUSE Bug 1140883", url: "https://bugzilla.suse.com/1140883", }, { category: "self", summary: "SUSE Bug 1140948", url: "https://bugzilla.suse.com/1140948", }, { category: "self", summary: "SUSE Bug 1141013", url: "https://bugzilla.suse.com/1141013", }, { category: "self", summary: "SUSE Bug 1141340", url: "https://bugzilla.suse.com/1141340", }, { category: "self", summary: "SUSE Bug 1141543", url: "https://bugzilla.suse.com/1141543", }, { category: "self", summary: "SUSE Bug 1142076", url: "https://bugzilla.suse.com/1142076", }, { category: "self", summary: "SUSE Bug 1142095", url: "https://bugzilla.suse.com/1142095", }, { category: "self", summary: "SUSE Bug 1142635", url: "https://bugzilla.suse.com/1142635", }, { category: "self", summary: "SUSE Bug 1142667", url: "https://bugzilla.suse.com/1142667", }, { category: "self", summary: "SUSE Bug 1142924", url: "https://bugzilla.suse.com/1142924", }, { category: "self", summary: "SUSE Bug 1143706", url: "https://bugzilla.suse.com/1143706", }, { category: "self", summary: "SUSE Bug 1143959", url: "https://bugzilla.suse.com/1143959", }, { category: "self", summary: "SUSE Bug 1144333", url: "https://bugzilla.suse.com/1144333", }, { category: "self", summary: "SUSE Bug 1144338", url: "https://bugzilla.suse.com/1144338", }, { category: "self", summary: "SUSE Bug 1144375", url: "https://bugzilla.suse.com/1144375", }, { category: "self", summary: "SUSE Bug 1144449", url: "https://bugzilla.suse.com/1144449", }, { category: "self", summary: "SUSE Bug 1144653", url: "https://bugzilla.suse.com/1144653", }, { category: "self", summary: "SUSE Bug 1144903", url: "https://bugzilla.suse.com/1144903", }, { category: "self", summary: "SUSE Bug 1145099", url: "https://bugzilla.suse.com/1145099", }, { category: "self", summary: "SUSE Bug 1145661", url: "https://bugzilla.suse.com/1145661", }, { category: "self", summary: "SUSE Bug 1146042", url: "https://bugzilla.suse.com/1146042", }, { category: "self", summary: "SUSE Bug 1146519", url: "https://bugzilla.suse.com/1146519", }, { category: "self", summary: "SUSE Bug 1146544", url: "https://bugzilla.suse.com/1146544", }, { category: "self", summary: "SUSE Bug 1146612", url: "https://bugzilla.suse.com/1146612", }, { category: "self", summary: "SUSE Bug 1146664", url: "https://bugzilla.suse.com/1146664", }, { category: "self", summary: "SUSE Bug 1148133", url: "https://bugzilla.suse.com/1148133", }, { category: "self", summary: "SUSE Bug 1148410", url: "https://bugzilla.suse.com/1148410", }, { category: "self", summary: "SUSE Bug 1148712", url: "https://bugzilla.suse.com/1148712", }, { category: "self", summary: "SUSE Bug 1148859", url: "https://bugzilla.suse.com/1148859", }, { category: "self", summary: "SUSE Bug 1148868", url: "https://bugzilla.suse.com/1148868", }, { category: "self", summary: "SUSE Bug 1149083", url: "https://bugzilla.suse.com/1149083", }, { category: "self", summary: "SUSE Bug 1149119", url: "https://bugzilla.suse.com/1149119", }, { category: "self", summary: "SUSE Bug 1149224", url: "https://bugzilla.suse.com/1149224", }, { category: "self", summary: "SUSE Bug 1149446", url: "https://bugzilla.suse.com/1149446", }, { category: "self", summary: "SUSE Bug 1149448", url: "https://bugzilla.suse.com/1149448", }, { category: "self", summary: "SUSE Bug 1149555", url: "https://bugzilla.suse.com/1149555", }, { category: "self", summary: "SUSE Bug 1149652", url: "https://bugzilla.suse.com/1149652", }, { category: "self", summary: "SUSE Bug 1149713", url: "https://bugzilla.suse.com/1149713", }, { category: "self", summary: "SUSE Bug 1149853", url: "https://bugzilla.suse.com/1149853", }, { category: "self", summary: "SUSE Bug 1149940", url: "https://bugzilla.suse.com/1149940", }, { category: "self", summary: "SUSE Bug 1149959", url: "https://bugzilla.suse.com/1149959", }, { category: "self", summary: "SUSE Bug 1149963", url: "https://bugzilla.suse.com/1149963", }, { category: "self", summary: "SUSE Bug 1149976", url: "https://bugzilla.suse.com/1149976", }, { category: "self", summary: "SUSE Bug 1150025", url: "https://bugzilla.suse.com/1150025", }, { category: "self", summary: "SUSE Bug 1150033", url: "https://bugzilla.suse.com/1150033", }, { category: "self", summary: "SUSE Bug 1150112", url: "https://bugzilla.suse.com/1150112", }, { category: "self", summary: "SUSE Bug 1150305", url: "https://bugzilla.suse.com/1150305", }, { category: "self", summary: "SUSE Bug 1150381", url: "https://bugzilla.suse.com/1150381", }, { category: "self", summary: "SUSE Bug 1150423", url: "https://bugzilla.suse.com/1150423", }, { category: "self", summary: "SUSE Bug 1150452", url: "https://bugzilla.suse.com/1150452", }, { category: "self", summary: "SUSE Bug 1150457", url: "https://bugzilla.suse.com/1150457", }, { category: "self", summary: "SUSE Bug 1150465", url: "https://bugzilla.suse.com/1150465", }, { category: "self", summary: "SUSE Bug 1150466", url: "https://bugzilla.suse.com/1150466", }, { category: "self", summary: "SUSE Bug 1150562", url: "https://bugzilla.suse.com/1150562", }, { category: "self", summary: "SUSE Bug 1150727", url: "https://bugzilla.suse.com/1150727", }, { category: "self", summary: "SUSE Bug 1150846", url: "https://bugzilla.suse.com/1150846", }, { category: "self", summary: "SUSE Bug 1150860", url: "https://bugzilla.suse.com/1150860", }, { category: "self", summary: "SUSE Bug 1150861", url: "https://bugzilla.suse.com/1150861", }, { category: "self", summary: "SUSE Bug 1150875", url: "https://bugzilla.suse.com/1150875", }, { category: "self", summary: "SUSE Bug 1150933", url: "https://bugzilla.suse.com/1150933", }, { category: "self", summary: "SUSE Bug 1151021", url: "https://bugzilla.suse.com/1151021", }, { category: "self", summary: "SUSE Bug 1151067", url: "https://bugzilla.suse.com/1151067", }, { category: "self", summary: "SUSE Bug 1151192", url: "https://bugzilla.suse.com/1151192", }, { category: "self", summary: "SUSE Bug 1151225", url: "https://bugzilla.suse.com/1151225", }, { category: "self", summary: "SUSE Bug 1151350", url: "https://bugzilla.suse.com/1151350", }, { category: "self", summary: "SUSE Bug 1151508", url: "https://bugzilla.suse.com/1151508", }, { category: "self", summary: "SUSE Bug 1151548", url: "https://bugzilla.suse.com/1151548", }, { category: "self", summary: "SUSE Bug 1151610", url: "https://bugzilla.suse.com/1151610", }, { category: "self", summary: "SUSE Bug 1151661", url: "https://bugzilla.suse.com/1151661", }, { category: "self", summary: "SUSE Bug 1151662", url: "https://bugzilla.suse.com/1151662", }, { category: "self", summary: "SUSE Bug 1151667", url: "https://bugzilla.suse.com/1151667", }, { category: "self", summary: "SUSE Bug 1151671", url: "https://bugzilla.suse.com/1151671", }, { category: "self", summary: "SUSE Bug 1151680", url: "https://bugzilla.suse.com/1151680", }, { category: "self", summary: "SUSE Bug 1151807", url: "https://bugzilla.suse.com/1151807", }, { category: "self", summary: "SUSE Bug 1151891", url: "https://bugzilla.suse.com/1151891", }, { category: "self", summary: "SUSE Bug 1151900", url: "https://bugzilla.suse.com/1151900", }, { category: "self", summary: "SUSE Bug 1151910", url: "https://bugzilla.suse.com/1151910", }, { category: "self", summary: "SUSE Bug 1151955", url: "https://bugzilla.suse.com/1151955", }, { category: "self", summary: "SUSE Bug 1152024", url: "https://bugzilla.suse.com/1152024", }, { category: "self", summary: "SUSE Bug 1152025", url: "https://bugzilla.suse.com/1152025", }, { category: "self", summary: "SUSE Bug 1152026", url: "https://bugzilla.suse.com/1152026", }, { category: "self", summary: "SUSE Bug 1152033", url: "https://bugzilla.suse.com/1152033", }, { category: "self", summary: "SUSE Bug 1152107", url: "https://bugzilla.suse.com/1152107", }, { category: "self", summary: "SUSE Bug 1152161", url: "https://bugzilla.suse.com/1152161", }, { category: "self", summary: "SUSE Bug 1152187", url: "https://bugzilla.suse.com/1152187", }, { category: "self", summary: "SUSE Bug 1152325", url: "https://bugzilla.suse.com/1152325", }, { category: "self", summary: "SUSE Bug 1152446", url: "https://bugzilla.suse.com/1152446", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1152460", url: "https://bugzilla.suse.com/1152460", }, { category: "self", summary: "SUSE Bug 1152466", url: "https://bugzilla.suse.com/1152466", }, { category: "self", summary: "SUSE Bug 1152497", url: "https://bugzilla.suse.com/1152497", }, { category: "self", summary: "SUSE Bug 1152505", url: "https://bugzilla.suse.com/1152505", }, { category: "self", summary: "SUSE Bug 1152506", url: "https://bugzilla.suse.com/1152506", }, { category: "self", summary: "SUSE Bug 1152525", url: "https://bugzilla.suse.com/1152525", }, { category: "self", summary: "SUSE Bug 1152624", url: "https://bugzilla.suse.com/1152624", }, { category: "self", summary: "SUSE Bug 1152631", url: "https://bugzilla.suse.com/1152631", }, { category: "self", summary: "SUSE Bug 1152665", url: "https://bugzilla.suse.com/1152665", }, { category: "self", summary: "SUSE Bug 1152685", url: "https://bugzilla.suse.com/1152685", }, { category: "self", summary: "SUSE Bug 1152696", url: "https://bugzilla.suse.com/1152696", }, { category: "self", summary: "SUSE Bug 1152697", url: "https://bugzilla.suse.com/1152697", }, { category: "self", summary: "SUSE Bug 1152782", url: "https://bugzilla.suse.com/1152782", }, { category: "self", summary: "SUSE Bug 1152788", url: "https://bugzilla.suse.com/1152788", }, { category: "self", summary: "SUSE Bug 1152790", url: "https://bugzilla.suse.com/1152790", }, { category: "self", summary: "SUSE Bug 1152791", url: "https://bugzilla.suse.com/1152791", }, { category: "self", summary: "SUSE Bug 1152885", url: "https://bugzilla.suse.com/1152885", }, { category: "self", summary: "SUSE Bug 1152972", url: "https://bugzilla.suse.com/1152972", }, { category: "self", summary: "SUSE Bug 1152974", url: "https://bugzilla.suse.com/1152974", }, { category: "self", summary: "SUSE Bug 1152975", url: "https://bugzilla.suse.com/1152975", }, { category: "self", summary: "SUSE Bug 1153108", url: "https://bugzilla.suse.com/1153108", }, { category: "self", summary: "SUSE Bug 1153112", url: "https://bugzilla.suse.com/1153112", }, { category: "self", summary: "SUSE Bug 1153158", url: "https://bugzilla.suse.com/1153158", }, { category: "self", summary: "SUSE Bug 1153236", url: "https://bugzilla.suse.com/1153236", }, { category: "self", summary: "SUSE Bug 1153263", url: "https://bugzilla.suse.com/1153263", }, { category: "self", summary: "SUSE Bug 1153476", url: "https://bugzilla.suse.com/1153476", }, { category: "self", summary: "SUSE Bug 1153509", url: "https://bugzilla.suse.com/1153509", }, { category: "self", summary: "SUSE Bug 1153607", url: "https://bugzilla.suse.com/1153607", }, { category: "self", summary: "SUSE Bug 1153628", url: "https://bugzilla.suse.com/1153628", }, { category: "self", summary: "SUSE Bug 1153646", url: "https://bugzilla.suse.com/1153646", }, { category: "self", summary: "SUSE Bug 1153681", url: "https://bugzilla.suse.com/1153681", }, { category: "self", summary: "SUSE Bug 1153713", url: "https://bugzilla.suse.com/1153713", }, { category: "self", summary: "SUSE Bug 1153717", url: "https://bugzilla.suse.com/1153717", }, { category: "self", summary: "SUSE Bug 1153718", url: "https://bugzilla.suse.com/1153718", }, { category: "self", summary: "SUSE Bug 1153719", url: "https://bugzilla.suse.com/1153719", }, { category: "self", summary: "SUSE Bug 1153811", url: "https://bugzilla.suse.com/1153811", }, { category: "self", summary: "SUSE Bug 1153969", url: "https://bugzilla.suse.com/1153969", }, { category: "self", summary: "SUSE Bug 1154043", url: "https://bugzilla.suse.com/1154043", }, { category: "self", summary: "SUSE Bug 1154048", url: "https://bugzilla.suse.com/1154048", }, { category: "self", summary: "SUSE Bug 1154058", url: "https://bugzilla.suse.com/1154058", }, { category: "self", summary: "SUSE Bug 1154108", url: "https://bugzilla.suse.com/1154108", }, { category: "self", summary: "SUSE Bug 1154124", url: "https://bugzilla.suse.com/1154124", }, { category: "self", summary: "SUSE Bug 1154189", url: "https://bugzilla.suse.com/1154189", }, { category: "self", summary: "SUSE Bug 1154242", url: "https://bugzilla.suse.com/1154242", }, { category: "self", summary: "SUSE Bug 1154244", url: "https://bugzilla.suse.com/1154244", }, { category: "self", summary: "SUSE Bug 1154268", url: "https://bugzilla.suse.com/1154268", }, { category: "self", summary: "SUSE Bug 1154354", url: "https://bugzilla.suse.com/1154354", }, { category: "self", summary: "SUSE Bug 1154355", url: "https://bugzilla.suse.com/1154355", }, { category: "self", summary: "SUSE Bug 1154372", url: "https://bugzilla.suse.com/1154372", }, { category: "self", summary: "SUSE Bug 1154521", url: "https://bugzilla.suse.com/1154521", }, { category: "self", summary: "SUSE Bug 1154526", url: "https://bugzilla.suse.com/1154526", }, { category: "self", summary: "SUSE Bug 1154578", url: "https://bugzilla.suse.com/1154578", }, { category: "self", summary: "SUSE Bug 1154601", url: "https://bugzilla.suse.com/1154601", }, { category: "self", summary: "SUSE Bug 1154607", url: "https://bugzilla.suse.com/1154607", }, { category: "self", summary: "SUSE Bug 1154608", url: "https://bugzilla.suse.com/1154608", }, { category: "self", summary: "SUSE Bug 1154610", url: "https://bugzilla.suse.com/1154610", }, { category: "self", summary: "SUSE Bug 1154611", url: "https://bugzilla.suse.com/1154611", }, { category: "self", summary: "SUSE Bug 1154651", url: "https://bugzilla.suse.com/1154651", }, { category: "self", summary: "SUSE Bug 1154737", url: "https://bugzilla.suse.com/1154737", }, { category: "self", summary: "SUSE Bug 1154768", url: "https://bugzilla.suse.com/1154768", }, { category: "self", summary: "SUSE Bug 1154848", url: "https://bugzilla.suse.com/1154848", }, { category: "self", summary: "SUSE Bug 1154858", url: "https://bugzilla.suse.com/1154858", }, { category: "self", summary: "SUSE Bug 1154905", url: "https://bugzilla.suse.com/1154905", }, { category: "self", summary: "SUSE Bug 1154916", url: "https://bugzilla.suse.com/1154916", }, { category: "self", summary: "SUSE Bug 1154956", url: "https://bugzilla.suse.com/1154956", }, { category: "self", summary: "SUSE Bug 1154959", url: "https://bugzilla.suse.com/1154959", }, { category: "self", summary: "SUSE Bug 1155021", url: "https://bugzilla.suse.com/1155021", }, { category: "self", summary: "SUSE Bug 1155061", url: "https://bugzilla.suse.com/1155061", }, { category: "self", summary: "SUSE Bug 1155178", url: "https://bugzilla.suse.com/1155178", }, { category: "self", summary: "SUSE Bug 1155179", url: "https://bugzilla.suse.com/1155179", }, { category: "self", summary: "SUSE Bug 1155184", url: "https://bugzilla.suse.com/1155184", }, { category: "self", summary: "SUSE Bug 1155186", url: "https://bugzilla.suse.com/1155186", }, { category: "self", summary: "SUSE Bug 1155331", url: "https://bugzilla.suse.com/1155331", }, { category: "self", summary: "SUSE Bug 1155334", url: "https://bugzilla.suse.com/1155334", }, { category: "self", summary: "SUSE Bug 1155671", url: "https://bugzilla.suse.com/1155671", }, { category: "self", summary: "SUSE Bug 1155689", url: "https://bugzilla.suse.com/1155689", }, { category: "self", summary: "SUSE Bug 1155692", url: "https://bugzilla.suse.com/1155692", }, { category: "self", summary: "SUSE Bug 1155812", url: "https://bugzilla.suse.com/1155812", }, { category: "self", summary: "SUSE Bug 1155817", url: "https://bugzilla.suse.com/1155817", }, { category: "self", summary: "SUSE Bug 1155836", url: "https://bugzilla.suse.com/1155836", }, { category: "self", summary: "SUSE Bug 1155897", url: "https://bugzilla.suse.com/1155897", }, { category: "self", summary: "SUSE Bug 1155921", url: "https://bugzilla.suse.com/1155921", }, { category: "self", summary: "SUSE Bug 1155945", url: "https://bugzilla.suse.com/1155945", }, { category: "self", summary: "SUSE Bug 1156187", url: "https://bugzilla.suse.com/1156187", }, { category: "self", summary: "SUSE Bug 1156258", url: "https://bugzilla.suse.com/1156258", }, { category: "self", summary: "SUSE Bug 1156259", url: "https://bugzilla.suse.com/1156259", }, { category: "self", summary: "SUSE Bug 1156286", url: "https://bugzilla.suse.com/1156286", }, { category: "self", summary: "SUSE Bug 1156429", url: "https://bugzilla.suse.com/1156429", }, { category: "self", summary: "SUSE Bug 1156462", url: "https://bugzilla.suse.com/1156462", }, { category: "self", summary: "SUSE Bug 1156466", url: "https://bugzilla.suse.com/1156466", }, { category: "self", summary: "SUSE Bug 1156471", url: "https://bugzilla.suse.com/1156471", }, { category: "self", summary: "SUSE Bug 1156494", url: "https://bugzilla.suse.com/1156494", }, { category: "self", summary: "SUSE Bug 1156609", url: "https://bugzilla.suse.com/1156609", }, { category: "self", summary: "SUSE Bug 1156700", url: "https://bugzilla.suse.com/1156700", }, { category: "self", summary: "SUSE Bug 1156729", url: "https://bugzilla.suse.com/1156729", }, { category: "self", summary: "SUSE Bug 1156882", url: "https://bugzilla.suse.com/1156882", }, { category: "self", summary: "SUSE Bug 1156928", url: "https://bugzilla.suse.com/1156928", }, { category: "self", summary: "SUSE Bug 1157032", url: "https://bugzilla.suse.com/1157032", }, { category: "self", summary: "SUSE Bug 1157038", url: "https://bugzilla.suse.com/1157038", }, { category: "self", summary: "SUSE Bug 1157042", url: "https://bugzilla.suse.com/1157042", }, { category: "self", summary: "SUSE Bug 1157044", url: "https://bugzilla.suse.com/1157044", }, { category: "self", summary: "SUSE Bug 1157045", url: "https://bugzilla.suse.com/1157045", }, { category: "self", summary: "SUSE Bug 1157046", url: "https://bugzilla.suse.com/1157046", }, { category: "self", summary: "SUSE Bug 1157049", url: "https://bugzilla.suse.com/1157049", }, { category: "self", summary: "SUSE Bug 1157070", url: "https://bugzilla.suse.com/1157070", }, { category: "self", summary: "SUSE Bug 1157115", url: "https://bugzilla.suse.com/1157115", }, { category: "self", summary: "SUSE Bug 1157143", url: "https://bugzilla.suse.com/1157143", }, { category: "self", summary: "SUSE Bug 1157145", url: "https://bugzilla.suse.com/1157145", }, { category: "self", summary: "SUSE Bug 1157158", url: "https://bugzilla.suse.com/1157158", }, { category: "self", summary: "SUSE Bug 1157160", url: "https://bugzilla.suse.com/1157160", }, { category: "self", summary: "SUSE Bug 1157162", url: "https://bugzilla.suse.com/1157162", }, { category: "self", summary: "SUSE Bug 1157169", url: "https://bugzilla.suse.com/1157169", }, { category: "self", summary: "SUSE Bug 1157171", url: "https://bugzilla.suse.com/1157171", }, { category: "self", summary: "SUSE Bug 1157173", url: "https://bugzilla.suse.com/1157173", }, { category: "self", summary: "SUSE Bug 1157178", url: "https://bugzilla.suse.com/1157178", }, { category: "self", summary: "SUSE Bug 1157180", url: "https://bugzilla.suse.com/1157180", }, { category: "self", summary: "SUSE Bug 1157182", url: "https://bugzilla.suse.com/1157182", }, { category: "self", summary: "SUSE Bug 1157183", url: "https://bugzilla.suse.com/1157183", }, { category: "self", summary: "SUSE Bug 1157184", url: "https://bugzilla.suse.com/1157184", }, { category: "self", summary: "SUSE Bug 1157191", url: "https://bugzilla.suse.com/1157191", }, { category: "self", summary: "SUSE Bug 1157193", url: "https://bugzilla.suse.com/1157193", }, { category: "self", summary: "SUSE Bug 1157197", url: "https://bugzilla.suse.com/1157197", }, { category: "self", summary: "SUSE Bug 1157298", url: "https://bugzilla.suse.com/1157298", }, { category: "self", summary: "SUSE Bug 1157303", url: "https://bugzilla.suse.com/1157303", }, { category: "self", summary: "SUSE Bug 1157304", url: "https://bugzilla.suse.com/1157304", }, { category: "self", summary: "SUSE Bug 1157307", url: "https://bugzilla.suse.com/1157307", }, { category: "self", summary: "SUSE Bug 1157324", url: "https://bugzilla.suse.com/1157324", }, { category: "self", summary: "SUSE Bug 1157333", url: "https://bugzilla.suse.com/1157333", }, { category: "self", summary: "SUSE Bug 1157386", url: "https://bugzilla.suse.com/1157386", }, { category: "self", summary: "SUSE Bug 1157424", url: "https://bugzilla.suse.com/1157424", }, { category: "self", summary: "SUSE Bug 1157463", url: "https://bugzilla.suse.com/1157463", }, { category: "self", summary: "SUSE Bug 1157499", url: "https://bugzilla.suse.com/1157499", }, { category: "self", summary: "SUSE Bug 1157678", url: "https://bugzilla.suse.com/1157678", }, { category: "self", summary: "SUSE Bug 1157698", url: "https://bugzilla.suse.com/1157698", }, { category: "self", summary: "SUSE Bug 1157778", url: "https://bugzilla.suse.com/1157778", }, { category: "self", summary: "SUSE Bug 1157853", url: "https://bugzilla.suse.com/1157853", }, { category: "self", summary: "SUSE Bug 1157895", url: "https://bugzilla.suse.com/1157895", }, { category: "self", summary: "SUSE Bug 1157908", url: "https://bugzilla.suse.com/1157908", }, { category: "self", summary: "SUSE Bug 1158021", url: "https://bugzilla.suse.com/1158021", }, { category: "self", summary: "SUSE Bug 1158049", url: "https://bugzilla.suse.com/1158049", }, { category: "self", summary: "SUSE Bug 1158063", url: "https://bugzilla.suse.com/1158063", }, { category: "self", summary: "SUSE Bug 1158064", url: "https://bugzilla.suse.com/1158064", }, { category: "self", summary: "SUSE Bug 1158065", url: "https://bugzilla.suse.com/1158065", }, { category: "self", summary: "SUSE Bug 1158066", url: "https://bugzilla.suse.com/1158066", }, { category: "self", summary: "SUSE Bug 1158067", url: "https://bugzilla.suse.com/1158067", }, { category: "self", summary: "SUSE Bug 1158068", url: "https://bugzilla.suse.com/1158068", }, { category: "self", summary: "SUSE Bug 1158071", url: "https://bugzilla.suse.com/1158071", }, { category: "self", summary: "SUSE Bug 1158082", url: "https://bugzilla.suse.com/1158082", }, { category: "self", summary: "SUSE Bug 1158094", url: "https://bugzilla.suse.com/1158094", }, { category: "self", summary: "SUSE Bug 1158132", url: "https://bugzilla.suse.com/1158132", }, { category: "self", summary: "SUSE Bug 1158381", url: "https://bugzilla.suse.com/1158381", }, { category: "self", summary: "SUSE Bug 1158394", url: "https://bugzilla.suse.com/1158394", }, { category: "self", summary: "SUSE Bug 1158398", url: "https://bugzilla.suse.com/1158398", }, { category: "self", summary: "SUSE Bug 1158407", url: "https://bugzilla.suse.com/1158407", }, { category: "self", summary: "SUSE Bug 1158410", url: "https://bugzilla.suse.com/1158410", }, { category: "self", summary: "SUSE Bug 1158413", url: "https://bugzilla.suse.com/1158413", }, { category: "self", summary: "SUSE Bug 1158417", url: "https://bugzilla.suse.com/1158417", }, { category: "self", summary: "SUSE Bug 1158427", url: "https://bugzilla.suse.com/1158427", }, { category: "self", summary: "SUSE Bug 1158445", url: "https://bugzilla.suse.com/1158445", }, { category: "self", summary: "SUSE Bug 1158533", url: "https://bugzilla.suse.com/1158533", }, { category: "self", summary: "SUSE Bug 1158637", url: "https://bugzilla.suse.com/1158637", }, { category: "self", summary: "SUSE Bug 1158638", url: "https://bugzilla.suse.com/1158638", }, { category: "self", summary: "SUSE Bug 1158639", url: "https://bugzilla.suse.com/1158639", }, { category: "self", summary: "SUSE Bug 1158640", url: "https://bugzilla.suse.com/1158640", }, { category: "self", summary: "SUSE Bug 1158641", url: "https://bugzilla.suse.com/1158641", }, { category: "self", summary: "SUSE Bug 1158643", url: "https://bugzilla.suse.com/1158643", }, { category: "self", summary: "SUSE Bug 1158644", url: "https://bugzilla.suse.com/1158644", }, { category: "self", summary: "SUSE Bug 1158645", url: "https://bugzilla.suse.com/1158645", }, { category: "self", summary: "SUSE Bug 1158646", url: "https://bugzilla.suse.com/1158646", }, { category: "self", summary: "SUSE Bug 1158647", url: "https://bugzilla.suse.com/1158647", }, { category: "self", summary: "SUSE Bug 1158649", url: "https://bugzilla.suse.com/1158649", }, { category: "self", summary: "SUSE Bug 1158651", url: "https://bugzilla.suse.com/1158651", }, { category: "self", summary: "SUSE Bug 1158652", url: "https://bugzilla.suse.com/1158652", }, { category: "self", summary: "SUSE Bug 1158819", url: "https://bugzilla.suse.com/1158819", }, { category: "self", summary: "SUSE Bug 1158823", url: "https://bugzilla.suse.com/1158823", }, { category: "self", summary: "SUSE Bug 1158824", url: "https://bugzilla.suse.com/1158824", }, { category: "self", summary: "SUSE Bug 1158827", url: "https://bugzilla.suse.com/1158827", }, { category: "self", summary: "SUSE Bug 1158834", url: "https://bugzilla.suse.com/1158834", }, { category: "self", summary: "SUSE Bug 1158893", url: "https://bugzilla.suse.com/1158893", }, { category: "self", summary: "SUSE Bug 1158900", url: "https://bugzilla.suse.com/1158900", }, { category: "self", summary: "SUSE Bug 1158903", url: "https://bugzilla.suse.com/1158903", }, { category: "self", summary: "SUSE Bug 1158904", url: "https://bugzilla.suse.com/1158904", }, { category: "self", summary: "SUSE Bug 1158954", url: "https://bugzilla.suse.com/1158954", }, { category: "self", summary: "SUSE Bug 1159024", url: "https://bugzilla.suse.com/1159024", }, { category: "self", summary: "SUSE Bug 1159096", url: "https://bugzilla.suse.com/1159096", }, { category: "self", summary: "SUSE Bug 1159297", url: "https://bugzilla.suse.com/1159297", }, { category: "self", summary: "SUSE Bug 1159483", url: "https://bugzilla.suse.com/1159483", }, { category: "self", summary: "SUSE Bug 1159484", url: "https://bugzilla.suse.com/1159484", }, { category: "self", summary: "SUSE Bug 1159500", url: "https://bugzilla.suse.com/1159500", }, { category: "self", summary: "SUSE Bug 1159569", url: "https://bugzilla.suse.com/1159569", }, { category: "self", summary: "SUSE Bug 1159841", url: "https://bugzilla.suse.com/1159841", }, { category: "self", summary: "SUSE Bug 1159908", url: "https://bugzilla.suse.com/1159908", }, { category: "self", summary: "SUSE Bug 1159909", url: "https://bugzilla.suse.com/1159909", }, { category: "self", summary: "SUSE Bug 1159910", url: "https://bugzilla.suse.com/1159910", }, { category: "self", summary: "SUSE Bug 972655", url: "https://bugzilla.suse.com/972655", }, { category: "self", summary: "SUSE CVE CVE-2017-18595 page", url: "https://www.suse.com/security/cve/CVE-2017-18595/", }, { category: "self", summary: "SUSE CVE CVE-2018-12207 page", url: "https://www.suse.com/security/cve/CVE-2018-12207/", }, { category: "self", summary: "SUSE CVE CVE-2019-0154 page", url: "https://www.suse.com/security/cve/CVE-2019-0154/", }, { category: "self", summary: "SUSE CVE CVE-2019-0155 page", url: "https://www.suse.com/security/cve/CVE-2019-0155/", }, { category: "self", summary: "SUSE CVE CVE-2019-10220 page", url: "https://www.suse.com/security/cve/CVE-2019-10220/", }, { category: "self", summary: "SUSE CVE CVE-2019-11135 page", url: "https://www.suse.com/security/cve/CVE-2019-11135/", }, { category: "self", summary: "SUSE CVE CVE-2019-14821 page", url: "https://www.suse.com/security/cve/CVE-2019-14821/", }, { category: "self", summary: "SUSE CVE CVE-2019-14835 page", url: "https://www.suse.com/security/cve/CVE-2019-14835/", }, { category: "self", summary: "SUSE CVE CVE-2019-14895 page", url: "https://www.suse.com/security/cve/CVE-2019-14895/", }, { category: "self", summary: "SUSE CVE CVE-2019-14901 page", url: "https://www.suse.com/security/cve/CVE-2019-14901/", }, { category: "self", summary: "SUSE CVE CVE-2019-15030 page", url: "https://www.suse.com/security/cve/CVE-2019-15030/", }, { category: "self", summary: "SUSE CVE CVE-2019-15031 page", url: "https://www.suse.com/security/cve/CVE-2019-15031/", }, { category: "self", summary: "SUSE CVE CVE-2019-15213 page", url: "https://www.suse.com/security/cve/CVE-2019-15213/", }, { category: "self", summary: "SUSE CVE CVE-2019-15916 page", url: "https://www.suse.com/security/cve/CVE-2019-15916/", }, { category: "self", summary: "SUSE CVE CVE-2019-16231 page", url: "https://www.suse.com/security/cve/CVE-2019-16231/", }, { category: "self", summary: "SUSE CVE CVE-2019-16232 page", url: "https://www.suse.com/security/cve/CVE-2019-16232/", }, { category: "self", summary: "SUSE CVE CVE-2019-16233 page", url: "https://www.suse.com/security/cve/CVE-2019-16233/", }, { category: "self", summary: "SUSE CVE CVE-2019-16234 page", url: "https://www.suse.com/security/cve/CVE-2019-16234/", }, { category: "self", summary: "SUSE CVE CVE-2019-16746 page", url: "https://www.suse.com/security/cve/CVE-2019-16746/", }, { category: "self", summary: "SUSE CVE CVE-2019-16995 page", url: "https://www.suse.com/security/cve/CVE-2019-16995/", }, { category: "self", summary: "SUSE CVE CVE-2019-17055 page", url: "https://www.suse.com/security/cve/CVE-2019-17055/", }, { category: "self", summary: "SUSE CVE CVE-2019-17056 page", url: "https://www.suse.com/security/cve/CVE-2019-17056/", }, { category: "self", summary: "SUSE CVE CVE-2019-17133 page", url: "https://www.suse.com/security/cve/CVE-2019-17133/", }, { category: "self", summary: "SUSE CVE CVE-2019-17666 page", url: "https://www.suse.com/security/cve/CVE-2019-17666/", }, { category: "self", summary: "SUSE CVE CVE-2019-18660 page", url: "https://www.suse.com/security/cve/CVE-2019-18660/", }, { category: "self", summary: "SUSE CVE CVE-2019-18683 page", url: "https://www.suse.com/security/cve/CVE-2019-18683/", }, { category: "self", summary: "SUSE CVE CVE-2019-18805 page", url: "https://www.suse.com/security/cve/CVE-2019-18805/", }, { category: "self", summary: "SUSE CVE CVE-2019-18808 page", url: "https://www.suse.com/security/cve/CVE-2019-18808/", }, { category: "self", summary: "SUSE CVE CVE-2019-18809 page", url: "https://www.suse.com/security/cve/CVE-2019-18809/", }, { category: "self", summary: "SUSE CVE CVE-2019-19046 page", url: "https://www.suse.com/security/cve/CVE-2019-19046/", }, { category: "self", summary: "SUSE CVE CVE-2019-19049 page", url: "https://www.suse.com/security/cve/CVE-2019-19049/", }, { category: "self", summary: "SUSE CVE CVE-2019-19051 page", url: "https://www.suse.com/security/cve/CVE-2019-19051/", }, { category: "self", summary: "SUSE CVE CVE-2019-19052 page", url: "https://www.suse.com/security/cve/CVE-2019-19052/", }, { category: "self", summary: "SUSE CVE CVE-2019-19056 page", url: "https://www.suse.com/security/cve/CVE-2019-19056/", }, { category: "self", summary: "SUSE CVE CVE-2019-19057 page", url: "https://www.suse.com/security/cve/CVE-2019-19057/", }, { category: "self", summary: "SUSE CVE CVE-2019-19058 page", url: "https://www.suse.com/security/cve/CVE-2019-19058/", }, { category: "self", summary: "SUSE CVE CVE-2019-19060 page", url: "https://www.suse.com/security/cve/CVE-2019-19060/", }, { category: "self", summary: "SUSE CVE CVE-2019-19062 page", url: "https://www.suse.com/security/cve/CVE-2019-19062/", }, { category: "self", summary: "SUSE CVE CVE-2019-19063 page", url: "https://www.suse.com/security/cve/CVE-2019-19063/", }, { category: "self", summary: "SUSE CVE CVE-2019-19065 page", url: "https://www.suse.com/security/cve/CVE-2019-19065/", }, { category: "self", summary: "SUSE CVE CVE-2019-19066 page", url: "https://www.suse.com/security/cve/CVE-2019-19066/", }, { category: "self", summary: "SUSE CVE CVE-2019-19067 page", url: "https://www.suse.com/security/cve/CVE-2019-19067/", }, { category: "self", summary: "SUSE CVE CVE-2019-19068 page", url: "https://www.suse.com/security/cve/CVE-2019-19068/", }, { category: "self", summary: "SUSE CVE CVE-2019-19073 page", url: "https://www.suse.com/security/cve/CVE-2019-19073/", }, { category: "self", summary: "SUSE CVE CVE-2019-19074 page", url: "https://www.suse.com/security/cve/CVE-2019-19074/", }, { category: "self", summary: "SUSE CVE CVE-2019-19075 page", url: "https://www.suse.com/security/cve/CVE-2019-19075/", }, { category: "self", summary: "SUSE CVE CVE-2019-19077 page", url: "https://www.suse.com/security/cve/CVE-2019-19077/", }, { category: "self", summary: "SUSE CVE CVE-2019-19078 page", url: "https://www.suse.com/security/cve/CVE-2019-19078/", }, { category: "self", summary: "SUSE CVE CVE-2019-19080 page", url: "https://www.suse.com/security/cve/CVE-2019-19080/", }, { category: "self", summary: "SUSE CVE CVE-2019-19081 page", url: "https://www.suse.com/security/cve/CVE-2019-19081/", }, { category: "self", summary: "SUSE CVE CVE-2019-19082 page", url: "https://www.suse.com/security/cve/CVE-2019-19082/", }, { category: "self", summary: "SUSE CVE CVE-2019-19083 page", url: "https://www.suse.com/security/cve/CVE-2019-19083/", }, { category: "self", summary: "SUSE CVE CVE-2019-19227 page", url: "https://www.suse.com/security/cve/CVE-2019-19227/", }, { category: "self", summary: "SUSE CVE CVE-2019-19319 page", url: "https://www.suse.com/security/cve/CVE-2019-19319/", }, { category: "self", summary: "SUSE CVE CVE-2019-19332 page", url: "https://www.suse.com/security/cve/CVE-2019-19332/", }, { category: "self", summary: "SUSE CVE CVE-2019-19338 page", url: "https://www.suse.com/security/cve/CVE-2019-19338/", }, { category: "self", summary: "SUSE CVE CVE-2019-19447 page", url: "https://www.suse.com/security/cve/CVE-2019-19447/", }, { category: "self", summary: "SUSE CVE CVE-2019-19523 page", url: "https://www.suse.com/security/cve/CVE-2019-19523/", }, { category: "self", summary: "SUSE CVE CVE-2019-19524 page", url: "https://www.suse.com/security/cve/CVE-2019-19524/", }, { category: "self", summary: "SUSE CVE CVE-2019-19525 page", url: "https://www.suse.com/security/cve/CVE-2019-19525/", }, { category: "self", summary: "SUSE CVE CVE-2019-19526 page", url: "https://www.suse.com/security/cve/CVE-2019-19526/", }, { category: "self", summary: "SUSE CVE CVE-2019-19527 page", url: "https://www.suse.com/security/cve/CVE-2019-19527/", }, { category: "self", summary: "SUSE CVE CVE-2019-19528 page", url: "https://www.suse.com/security/cve/CVE-2019-19528/", }, { category: "self", summary: "SUSE CVE CVE-2019-19529 page", url: "https://www.suse.com/security/cve/CVE-2019-19529/", }, { category: "self", summary: "SUSE CVE CVE-2019-19530 page", url: "https://www.suse.com/security/cve/CVE-2019-19530/", }, { category: "self", summary: "SUSE CVE CVE-2019-19531 page", url: "https://www.suse.com/security/cve/CVE-2019-19531/", }, { category: "self", summary: "SUSE CVE CVE-2019-19532 page", url: "https://www.suse.com/security/cve/CVE-2019-19532/", }, { category: "self", summary: "SUSE CVE CVE-2019-19533 page", url: "https://www.suse.com/security/cve/CVE-2019-19533/", }, { category: "self", summary: "SUSE CVE CVE-2019-19534 page", url: "https://www.suse.com/security/cve/CVE-2019-19534/", }, { category: "self", summary: "SUSE CVE CVE-2019-19535 page", url: "https://www.suse.com/security/cve/CVE-2019-19535/", }, { category: "self", summary: "SUSE CVE CVE-2019-19536 page", url: "https://www.suse.com/security/cve/CVE-2019-19536/", }, { category: "self", summary: "SUSE CVE CVE-2019-19537 page", url: "https://www.suse.com/security/cve/CVE-2019-19537/", }, { category: "self", summary: "SUSE CVE CVE-2019-19543 page", url: "https://www.suse.com/security/cve/CVE-2019-19543/", }, { category: "self", summary: "SUSE CVE CVE-2019-19767 page", url: "https://www.suse.com/security/cve/CVE-2019-19767/", }, { category: "self", summary: "SUSE CVE CVE-2019-19966 page", url: "https://www.suse.com/security/cve/CVE-2019-19966/", }, { category: "self", summary: "SUSE CVE CVE-2019-20054 page", url: "https://www.suse.com/security/cve/CVE-2019-20054/", }, { category: "self", summary: "SUSE CVE CVE-2019-20095 page", url: "https://www.suse.com/security/cve/CVE-2019-20095/", }, { category: "self", summary: "SUSE CVE CVE-2019-20096 page", url: "https://www.suse.com/security/cve/CVE-2019-20096/", }, { category: "self", summary: "SUSE CVE CVE-2019-9456 page", url: "https://www.suse.com/security/cve/CVE-2019-9456/", }, { category: "self", summary: "SUSE CVE CVE-2019-9506 page", url: "https://www.suse.com/security/cve/CVE-2019-9506/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2020-01-14T10:06:03Z", generator: { date: "2020-01-14T10:06:03Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2020:0093-1", initial_release_date: "2020-01-14T10:06:03Z", revision_history: [ { date: "2020-01-14T10:06:03Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-4.12.14-16.7.1.noarch", product: { name: "kernel-devel-azure-4.12.14-16.7.1.noarch", product_id: "kernel-devel-azure-4.12.14-16.7.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.12.14-16.7.1.noarch", product: { name: "kernel-source-azure-4.12.14-16.7.1.noarch", product_id: "kernel-source-azure-4.12.14-16.7.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-4.12.14-16.7.1.x86_64", product: { name: "cluster-md-kmp-azure-4.12.14-16.7.1.x86_64", product_id: "cluster-md-kmp-azure-4.12.14-16.7.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-4.12.14-16.7.1.x86_64", product: { name: "dlm-kmp-azure-4.12.14-16.7.1.x86_64", product_id: "dlm-kmp-azure-4.12.14-16.7.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-4.12.14-16.7.1.x86_64", product: { name: "gfs2-kmp-azure-4.12.14-16.7.1.x86_64", product_id: "gfs2-kmp-azure-4.12.14-16.7.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-4.12.14-16.7.1.x86_64", product: { name: "kernel-azure-4.12.14-16.7.1.x86_64", product_id: "kernel-azure-4.12.14-16.7.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.12.14-16.7.1.x86_64", product: { name: "kernel-azure-base-4.12.14-16.7.1.x86_64", product_id: "kernel-azure-base-4.12.14-16.7.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.12.14-16.7.1.x86_64", product: { name: "kernel-azure-devel-4.12.14-16.7.1.x86_64", product_id: "kernel-azure-devel-4.12.14-16.7.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-4.12.14-16.7.1.x86_64", product: { name: "kernel-azure-extra-4.12.14-16.7.1.x86_64", product_id: "kernel-azure-extra-4.12.14-16.7.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-kgraft-devel-4.12.14-16.7.1.x86_64", product: { name: "kernel-azure-kgraft-devel-4.12.14-16.7.1.x86_64", product_id: "kernel-azure-kgraft-devel-4.12.14-16.7.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.12.14-16.7.1.x86_64", product: { name: "kernel-syms-azure-4.12.14-16.7.1.x86_64", product_id: "kernel-syms-azure-4.12.14-16.7.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-4.12.14-16.7.1.x86_64", product: { name: "kselftests-kmp-azure-4.12.14-16.7.1.x86_64", product_id: "kselftests-kmp-azure-4.12.14-16.7.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-4.12.14-16.7.1.x86_64", product: { name: "ocfs2-kmp-azure-4.12.14-16.7.1.x86_64", product_id: "ocfs2-kmp-azure-4.12.14-16.7.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", }, product_reference: "kernel-azure-4.12.14-16.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-16.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-16.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-16.7.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-16.7.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-16.7.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-16.7.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-16.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", }, product_reference: "kernel-azure-4.12.14-16.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-16.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-16.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-16.7.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-16.7.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-16.7.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-16.7.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-16.7.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2017-18595", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18595", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18595", url: "https://www.suse.com/security/cve/CVE-2017-18595", }, { category: "external", summary: "SUSE Bug 1149555 for CVE-2017-18595", url: "https://bugzilla.suse.com/1149555", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2017-18595", }, { cve: "CVE-2018-12207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12207", }, ], notes: [ { category: "general", text: "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12207", url: "https://www.suse.com/security/cve/CVE-2018-12207", }, { category: "external", summary: "SUSE Bug 1117665 for CVE-2018-12207", url: "https://bugzilla.suse.com/1117665", }, { category: "external", summary: "SUSE Bug 1139073 for CVE-2018-12207", url: "https://bugzilla.suse.com/1139073", }, { category: "external", summary: "SUSE Bug 1152505 for CVE-2018-12207", url: "https://bugzilla.suse.com/1152505", }, { category: "external", summary: "SUSE Bug 1155812 for CVE-2018-12207", url: "https://bugzilla.suse.com/1155812", }, { category: "external", summary: "SUSE Bug 1155817 for CVE-2018-12207", url: "https://bugzilla.suse.com/1155817", }, { category: "external", summary: "SUSE Bug 1155945 for CVE-2018-12207", url: "https://bugzilla.suse.com/1155945", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2018-12207", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2018-12207", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2018-12207", }, { cve: "CVE-2019-0154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0154", }, ], notes: [ { category: "general", text: "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0154", url: "https://www.suse.com/security/cve/CVE-2019-0154", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0154", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2019-0154", url: "https://bugzilla.suse.com/1181720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "important", }, ], title: "CVE-2019-0154", }, { cve: "CVE-2019-0155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0155", }, ], notes: [ { category: "general", text: "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0155", url: "https://www.suse.com/security/cve/CVE-2019-0155", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0155", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1135967 for CVE-2019-0155", url: "https://bugzilla.suse.com/1135967", }, { category: "external", summary: "SUSE Bug 1173663 for CVE-2019-0155", url: "https://bugzilla.suse.com/1173663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "important", }, ], title: "CVE-2019-0155", }, { cve: "CVE-2019-10220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10220", }, ], notes: [ { category: "general", text: "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10220", url: "https://www.suse.com/security/cve/CVE-2019-10220", }, { category: "external", summary: "SUSE Bug 1144903 for CVE-2019-10220", url: "https://bugzilla.suse.com/1144903", }, { category: "external", summary: "SUSE Bug 1153108 for CVE-2019-10220", url: "https://bugzilla.suse.com/1153108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "important", }, ], title: "CVE-2019-10220", }, { cve: "CVE-2019-11135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11135", }, ], notes: [ { category: "general", text: "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11135", url: "https://www.suse.com/security/cve/CVE-2019-11135", }, { category: "external", summary: "SUSE Bug 1139073 for CVE-2019-11135", url: "https://bugzilla.suse.com/1139073", }, { category: "external", summary: "SUSE Bug 1152497 for CVE-2019-11135", url: "https://bugzilla.suse.com/1152497", }, { category: "external", summary: "SUSE Bug 1152505 for CVE-2019-11135", url: "https://bugzilla.suse.com/1152505", }, { category: "external", summary: "SUSE Bug 1152506 for CVE-2019-11135", url: "https://bugzilla.suse.com/1152506", }, { category: "external", summary: "SUSE Bug 1160120 for CVE-2019-11135", url: "https://bugzilla.suse.com/1160120", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2019-11135", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-11135", }, { cve: "CVE-2019-14821", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14821", }, ], notes: [ { category: "general", text: "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14821", url: "https://www.suse.com/security/cve/CVE-2019-14821", }, { category: "external", summary: "SUSE Bug 1151350 for CVE-2019-14821", url: "https://bugzilla.suse.com/1151350", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2019-14821", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-14821", }, { cve: "CVE-2019-14835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14835", }, ], notes: [ { category: "general", text: "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14835", url: "https://www.suse.com/security/cve/CVE-2019-14835", }, { category: "external", summary: "SUSE Bug 1150112 for CVE-2019-14835", url: "https://bugzilla.suse.com/1150112", }, { category: "external", summary: "SUSE Bug 1151021 for CVE-2019-14835", url: "https://bugzilla.suse.com/1151021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "important", }, ], title: "CVE-2019-14835", }, { cve: "CVE-2019-14895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14895", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14895", url: "https://www.suse.com/security/cve/CVE-2019-14895", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1157158 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157158", }, { category: "external", summary: "SUSE Bug 1173100 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173100", }, { category: "external", summary: "SUSE Bug 1173660 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "important", }, ], title: "CVE-2019-14895", }, { cve: "CVE-2019-14901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14901", }, ], notes: [ { category: "general", text: "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14901", url: "https://www.suse.com/security/cve/CVE-2019-14901", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14901", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1173661 for CVE-2019-14901", url: "https://bugzilla.suse.com/1173661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "important", }, ], title: "CVE-2019-14901", }, { cve: "CVE-2019-15030", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15030", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15030", url: "https://www.suse.com/security/cve/CVE-2019-15030", }, { category: "external", summary: "SUSE Bug 1149713 for CVE-2019-15030", url: "https://bugzilla.suse.com/1149713", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-15030", }, { cve: "CVE-2019-15031", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15031", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15031", url: "https://www.suse.com/security/cve/CVE-2019-15031", }, { category: "external", summary: "SUSE Bug 1149713 for CVE-2019-15031", url: "https://bugzilla.suse.com/1149713", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-15031", }, { cve: "CVE-2019-15213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15213", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15213", url: "https://www.suse.com/security/cve/CVE-2019-15213", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146544 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146544", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-15213", }, { cve: "CVE-2019-15916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15916", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15916", url: "https://www.suse.com/security/cve/CVE-2019-15916", }, { category: "external", summary: "SUSE Bug 1149448 for CVE-2019-15916", url: "https://bugzilla.suse.com/1149448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-15916", }, { cve: "CVE-2019-16231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16231", }, ], notes: [ { category: "general", text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16231", url: "https://www.suse.com/security/cve/CVE-2019-16231", }, { category: "external", summary: "SUSE Bug 1150466 for CVE-2019-16231", url: "https://bugzilla.suse.com/1150466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-16231", }, { cve: "CVE-2019-16232", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16232", }, ], notes: [ { category: "general", text: "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16232", url: "https://www.suse.com/security/cve/CVE-2019-16232", }, { category: "external", summary: "SUSE Bug 1150465 for CVE-2019-16232", url: "https://bugzilla.suse.com/1150465", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-16232", }, { cve: "CVE-2019-16233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16233", }, ], notes: [ { category: "general", text: "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16233", url: "https://www.suse.com/security/cve/CVE-2019-16233", }, { category: "external", summary: "SUSE Bug 1150457 for CVE-2019-16233", url: "https://bugzilla.suse.com/1150457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-16233", }, { cve: "CVE-2019-16234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16234", }, ], notes: [ { category: "general", text: "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16234", url: "https://www.suse.com/security/cve/CVE-2019-16234", }, { category: "external", summary: "SUSE Bug 1150452 for CVE-2019-16234", url: "https://bugzilla.suse.com/1150452", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-16234", }, { cve: "CVE-2019-16746", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16746", }, ], notes: [ { category: "general", text: "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16746", url: "https://www.suse.com/security/cve/CVE-2019-16746", }, { category: "external", summary: "SUSE Bug 1152107 for CVE-2019-16746", url: "https://bugzilla.suse.com/1152107", }, { category: "external", summary: "SUSE Bug 1173659 for CVE-2019-16746", url: "https://bugzilla.suse.com/1173659", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "important", }, ], title: "CVE-2019-16746", }, { cve: "CVE-2019-16995", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16995", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16995", url: "https://www.suse.com/security/cve/CVE-2019-16995", }, { category: "external", summary: "SUSE Bug 1152685 for CVE-2019-16995", url: "https://bugzilla.suse.com/1152685", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-16995", }, { cve: "CVE-2019-17055", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17055", }, ], notes: [ { category: "general", text: "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17055", url: "https://www.suse.com/security/cve/CVE-2019-17055", }, { category: "external", summary: "SUSE Bug 1152782 for CVE-2019-17055", url: "https://bugzilla.suse.com/1152782", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-17055", }, { cve: "CVE-2019-17056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17056", }, ], notes: [ { category: "general", text: "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17056", url: "https://www.suse.com/security/cve/CVE-2019-17056", }, { category: "external", summary: "SUSE Bug 1152788 for CVE-2019-17056", url: "https://bugzilla.suse.com/1152788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-17056", }, { cve: "CVE-2019-17133", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17133", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17133", url: "https://www.suse.com/security/cve/CVE-2019-17133", }, { category: "external", summary: "SUSE Bug 1153158 for CVE-2019-17133", url: "https://bugzilla.suse.com/1153158", }, { category: "external", summary: "SUSE Bug 1153161 for CVE-2019-17133", url: "https://bugzilla.suse.com/1153161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "important", }, ], title: "CVE-2019-17133", }, { cve: "CVE-2019-17666", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17666", }, ], notes: [ { category: "general", text: "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17666", url: "https://www.suse.com/security/cve/CVE-2019-17666", }, { category: "external", summary: "SUSE Bug 1154372 for CVE-2019-17666", url: "https://bugzilla.suse.com/1154372", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-17666", }, { cve: "CVE-2019-18660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18660", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18660", url: "https://www.suse.com/security/cve/CVE-2019-18660", }, { category: "external", summary: "SUSE Bug 1157038 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157038", }, { category: "external", summary: "SUSE Bug 1157923 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-18660", }, { cve: "CVE-2019-18683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18683", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18683", url: "https://www.suse.com/security/cve/CVE-2019-18683", }, { category: "external", summary: "SUSE Bug 1155897 for CVE-2019-18683", url: "https://bugzilla.suse.com/1155897", }, { category: "external", summary: "SUSE Bug 1173868 for CVE-2019-18683", url: "https://bugzilla.suse.com/1173868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-18683", }, { cve: "CVE-2019-18805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18805", }, ], notes: [ { category: "general", text: "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18805", url: "https://www.suse.com/security/cve/CVE-2019-18805", }, { category: "external", summary: "SUSE Bug 1156187 for CVE-2019-18805", url: "https://bugzilla.suse.com/1156187", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-18805", }, { cve: "CVE-2019-18808", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18808", }, ], notes: [ { category: "general", text: "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18808", url: "https://www.suse.com/security/cve/CVE-2019-18808", }, { category: "external", summary: "SUSE Bug 1156259 for CVE-2019-18808", url: "https://bugzilla.suse.com/1156259", }, { category: "external", summary: "SUSE Bug 1189884 for CVE-2019-18808", url: "https://bugzilla.suse.com/1189884", }, { category: "external", summary: "SUSE Bug 1190534 for CVE-2019-18808", url: "https://bugzilla.suse.com/1190534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-18808", }, { cve: "CVE-2019-18809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18809", }, ], notes: [ { category: "general", text: "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18809", url: "https://www.suse.com/security/cve/CVE-2019-18809", }, { category: "external", summary: "SUSE Bug 1156258 for CVE-2019-18809", url: "https://bugzilla.suse.com/1156258", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-18809", }, { cve: "CVE-2019-19046", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19046", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19046", url: "https://www.suse.com/security/cve/CVE-2019-19046", }, { category: "external", summary: "SUSE Bug 1157304 for CVE-2019-19046", url: "https://bugzilla.suse.com/1157304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19046", }, { cve: "CVE-2019-19049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19049", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19049", url: "https://www.suse.com/security/cve/CVE-2019-19049", }, { category: "external", summary: "SUSE Bug 1157173 for CVE-2019-19049", url: "https://bugzilla.suse.com/1157173", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19049", }, { cve: "CVE-2019-19051", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19051", }, ], notes: [ { category: "general", text: "A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19051", url: "https://www.suse.com/security/cve/CVE-2019-19051", }, { category: "external", summary: "SUSE Bug 1159024 for CVE-2019-19051", url: "https://bugzilla.suse.com/1159024", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19051", }, { cve: "CVE-2019-19052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19052", }, ], notes: [ { category: "general", text: "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19052", url: "https://www.suse.com/security/cve/CVE-2019-19052", }, { category: "external", summary: "SUSE Bug 1157324 for CVE-2019-19052", url: "https://bugzilla.suse.com/1157324", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19052", }, { cve: "CVE-2019-19056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19056", }, ], notes: [ { category: "general", text: "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19056", url: "https://www.suse.com/security/cve/CVE-2019-19056", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19056", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19057", }, ], notes: [ { category: "general", text: "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19057", url: "https://www.suse.com/security/cve/CVE-2019-19057", }, { category: "external", summary: "SUSE Bug 1157193 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157193", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19058", }, ], notes: [ { category: "general", text: "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19058", url: "https://www.suse.com/security/cve/CVE-2019-19058", }, { category: "external", summary: "SUSE Bug 1157145 for CVE-2019-19058", url: "https://bugzilla.suse.com/1157145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19058", }, { cve: "CVE-2019-19060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19060", }, ], notes: [ { category: "general", text: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19060", url: "https://www.suse.com/security/cve/CVE-2019-19060", }, { category: "external", summary: "SUSE Bug 1157178 for CVE-2019-19060", url: "https://bugzilla.suse.com/1157178", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19060", }, { cve: "CVE-2019-19062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19062", }, ], notes: [ { category: "general", text: "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19062", url: "https://www.suse.com/security/cve/CVE-2019-19062", }, { category: "external", summary: "SUSE Bug 1157333 for CVE-2019-19062", url: "https://bugzilla.suse.com/1157333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19063", }, ], notes: [ { category: "general", text: "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19063", url: "https://www.suse.com/security/cve/CVE-2019-19063", }, { category: "external", summary: "SUSE Bug 1157298 for CVE-2019-19063", url: "https://bugzilla.suse.com/1157298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19063", }, { cve: "CVE-2019-19065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19065", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19065", url: "https://www.suse.com/security/cve/CVE-2019-19065", }, { category: "external", summary: "SUSE Bug 1157191 for CVE-2019-19065", url: "https://bugzilla.suse.com/1157191", }, { category: "external", summary: "SUSE Bug 1173961 for CVE-2019-19065", url: "https://bugzilla.suse.com/1173961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "important", }, ], title: "CVE-2019-19065", }, { cve: "CVE-2019-19066", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19066", }, ], notes: [ { category: "general", text: "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19066", url: "https://www.suse.com/security/cve/CVE-2019-19066", }, { category: "external", summary: "SUSE Bug 1157303 for CVE-2019-19066", url: "https://bugzilla.suse.com/1157303", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19066", }, { cve: "CVE-2019-19067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19067", }, ], notes: [ { category: "general", text: "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19067", url: "https://www.suse.com/security/cve/CVE-2019-19067", }, { category: "external", summary: "SUSE Bug 1157180 for CVE-2019-19067", url: "https://bugzilla.suse.com/1157180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19068", }, ], notes: [ { category: "general", text: "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19068", url: "https://www.suse.com/security/cve/CVE-2019-19068", }, { category: "external", summary: "SUSE Bug 1157307 for CVE-2019-19068", url: "https://bugzilla.suse.com/1157307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19068", }, { cve: "CVE-2019-19073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19073", }, ], notes: [ { category: "general", text: "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19073", url: "https://www.suse.com/security/cve/CVE-2019-19073", }, { category: "external", summary: "SUSE Bug 1157070 for CVE-2019-19073", url: "https://bugzilla.suse.com/1157070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19074", }, ], notes: [ { category: "general", text: "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19074", url: "https://www.suse.com/security/cve/CVE-2019-19074", }, { category: "external", summary: "SUSE Bug 1157143 for CVE-2019-19074", url: "https://bugzilla.suse.com/1157143", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19075", }, ], notes: [ { category: "general", text: "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19075", url: "https://www.suse.com/security/cve/CVE-2019-19075", }, { category: "external", summary: "SUSE Bug 1157162 for CVE-2019-19075", url: "https://bugzilla.suse.com/1157162", }, { category: "external", summary: "SUSE Bug 1173958 for CVE-2019-19075", url: "https://bugzilla.suse.com/1173958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-19075", }, { cve: "CVE-2019-19077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19077", }, ], notes: [ { category: "general", text: "A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19077", url: "https://www.suse.com/security/cve/CVE-2019-19077", }, { category: "external", summary: "SUSE Bug 1157171 for CVE-2019-19077", url: "https://bugzilla.suse.com/1157171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19077", }, { cve: "CVE-2019-19078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19078", }, ], notes: [ { category: "general", text: "A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19078", url: "https://www.suse.com/security/cve/CVE-2019-19078", }, { category: "external", summary: "SUSE Bug 1157032 for CVE-2019-19078", url: "https://bugzilla.suse.com/1157032", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19078", }, { cve: "CVE-2019-19080", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19080", }, ], notes: [ { category: "general", text: "Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19080", url: "https://www.suse.com/security/cve/CVE-2019-19080", }, { category: "external", summary: "SUSE Bug 1157044 for CVE-2019-19080", url: "https://bugzilla.suse.com/1157044", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19080", }, { cve: "CVE-2019-19081", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19081", }, ], notes: [ { category: "general", text: "A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19081", url: "https://www.suse.com/security/cve/CVE-2019-19081", }, { category: "external", summary: "SUSE Bug 1157045 for CVE-2019-19081", url: "https://bugzilla.suse.com/1157045", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19081", }, { cve: "CVE-2019-19082", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19082", }, ], notes: [ { category: "general", text: "Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19082", url: "https://www.suse.com/security/cve/CVE-2019-19082", }, { category: "external", summary: "SUSE Bug 1157046 for CVE-2019-19082", url: "https://bugzilla.suse.com/1157046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19082", }, { cve: "CVE-2019-19083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19083", }, ], notes: [ { category: "general", text: "Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19083", url: "https://www.suse.com/security/cve/CVE-2019-19083", }, { category: "external", summary: "SUSE Bug 1157049 for CVE-2019-19083", url: "https://bugzilla.suse.com/1157049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19083", }, { cve: "CVE-2019-19227", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19227", }, ], notes: [ { category: "general", text: "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19227", url: "https://www.suse.com/security/cve/CVE-2019-19227", }, { category: "external", summary: "SUSE Bug 1157678 for CVE-2019-19227", url: "https://bugzilla.suse.com/1157678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19227", }, { cve: "CVE-2019-19319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19319", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19319", url: "https://www.suse.com/security/cve/CVE-2019-19319", }, { category: "external", summary: "SUSE Bug 1158021 for CVE-2019-19319", url: "https://bugzilla.suse.com/1158021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19319", }, { cve: "CVE-2019-19332", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19332", }, ], notes: [ { category: "general", text: "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19332", url: "https://www.suse.com/security/cve/CVE-2019-19332", }, { category: "external", summary: "SUSE Bug 1158827 for CVE-2019-19332", url: "https://bugzilla.suse.com/1158827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19332", }, { cve: "CVE-2019-19338", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19338", }, ], notes: [ { category: "general", text: "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19338", url: "https://www.suse.com/security/cve/CVE-2019-19338", }, { category: "external", summary: "SUSE Bug 1158954 for CVE-2019-19338", url: "https://bugzilla.suse.com/1158954", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19338", }, { cve: "CVE-2019-19447", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19447", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19447", url: "https://www.suse.com/security/cve/CVE-2019-19447", }, { category: "external", summary: "SUSE Bug 1158819 for CVE-2019-19447", url: "https://bugzilla.suse.com/1158819", }, { category: "external", summary: "SUSE Bug 1173869 for CVE-2019-19447", url: "https://bugzilla.suse.com/1173869", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "important", }, ], title: "CVE-2019-19447", }, { cve: "CVE-2019-19523", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19523", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19523", url: "https://www.suse.com/security/cve/CVE-2019-19523", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158823 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158823", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19523", }, { cve: "CVE-2019-19524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19524", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19524", url: "https://www.suse.com/security/cve/CVE-2019-19524", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158413 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158413", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-19524", }, { cve: "CVE-2019-19525", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19525", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19525", url: "https://www.suse.com/security/cve/CVE-2019-19525", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158417 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158417", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19525", }, { cve: "CVE-2019-19526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19526", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19526", url: "https://www.suse.com/security/cve/CVE-2019-19526", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158893 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19526", }, { cve: "CVE-2019-19527", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19527", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19527", url: "https://www.suse.com/security/cve/CVE-2019-19527", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158900 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158900", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19527", }, { cve: "CVE-2019-19528", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19528", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19528", url: "https://www.suse.com/security/cve/CVE-2019-19528", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158407 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158407", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19528", }, { cve: "CVE-2019-19529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19529", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19529", url: "https://www.suse.com/security/cve/CVE-2019-19529", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19529", }, { cve: "CVE-2019-19530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19530", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19530", url: "https://www.suse.com/security/cve/CVE-2019-19530", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158410 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158410", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19530", }, { cve: "CVE-2019-19531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19531", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19531", url: "https://www.suse.com/security/cve/CVE-2019-19531", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158427", }, { category: "external", summary: "SUSE Bug 1158445 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158445", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-19531", }, { cve: "CVE-2019-19532", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19532", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19532", url: "https://www.suse.com/security/cve/CVE-2019-19532", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158823 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158823", }, { category: "external", summary: "SUSE Bug 1158824 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158824", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19532", }, { cve: "CVE-2019-19533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19533", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19533", url: "https://www.suse.com/security/cve/CVE-2019-19533", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19533", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19533", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-19533", }, { cve: "CVE-2019-19534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19534", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19534", url: "https://www.suse.com/security/cve/CVE-2019-19534", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158398 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158398", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-19534", }, { cve: "CVE-2019-19535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19535", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19535", url: "https://www.suse.com/security/cve/CVE-2019-19535", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158903 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19535", }, { cve: "CVE-2019-19536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19536", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19536", url: "https://www.suse.com/security/cve/CVE-2019-19536", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158394 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158394", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-19536", }, { cve: "CVE-2019-19537", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19537", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19537", url: "https://www.suse.com/security/cve/CVE-2019-19537", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158904 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19537", }, { cve: "CVE-2019-19543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19543", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19543", url: "https://www.suse.com/security/cve/CVE-2019-19543", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19543", url: "https://bugzilla.suse.com/1158427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-19543", }, { cve: "CVE-2019-19767", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19767", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19767", url: "https://www.suse.com/security/cve/CVE-2019-19767", }, { category: "external", summary: "SUSE Bug 1159297 for CVE-2019-19767", url: "https://bugzilla.suse.com/1159297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-19767", }, { cve: "CVE-2019-19966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19966", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19966", url: "https://www.suse.com/security/cve/CVE-2019-19966", }, { category: "external", summary: "SUSE Bug 1159841 for CVE-2019-19966", url: "https://bugzilla.suse.com/1159841", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "low", }, ], title: "CVE-2019-19966", }, { cve: "CVE-2019-20054", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20054", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20054", url: "https://www.suse.com/security/cve/CVE-2019-20054", }, { category: "external", summary: "SUSE Bug 1159910 for CVE-2019-20054", url: "https://bugzilla.suse.com/1159910", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-20054", }, { cve: "CVE-2019-20095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20095", }, ], notes: [ { category: "general", text: "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20095", url: "https://www.suse.com/security/cve/CVE-2019-20095", }, { category: "external", summary: "SUSE Bug 1159909 for CVE-2019-20095", url: "https://bugzilla.suse.com/1159909", }, { category: "external", summary: "SUSE Bug 1159914 for CVE-2019-20095", url: "https://bugzilla.suse.com/1159914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "important", }, ], title: "CVE-2019-20095", }, { cve: "CVE-2019-20096", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20096", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20096", url: "https://www.suse.com/security/cve/CVE-2019-20096", }, { category: "external", summary: "SUSE Bug 1159908 for CVE-2019-20096", url: "https://bugzilla.suse.com/1159908", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-20096", }, { cve: "CVE-2019-9456", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9456", }, ], notes: [ { category: "general", text: "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9456", url: "https://www.suse.com/security/cve/CVE-2019-9456", }, { category: "external", summary: "SUSE Bug 1150025 for CVE-2019-9456", url: "https://bugzilla.suse.com/1150025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-9456", }, { cve: "CVE-2019-9506", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9506", }, ], notes: [ { category: "general", text: "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9506", url: "https://www.suse.com/security/cve/CVE-2019-9506", }, { category: "external", summary: "SUSE Bug 1137865 for CVE-2019-9506", url: "https://bugzilla.suse.com/1137865", }, { category: "external", summary: "SUSE Bug 1146042 for CVE-2019-9506", url: "https://bugzilla.suse.com/1146042", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-01-14T10:06:03Z", details: "moderate", }, ], title: "CVE-2019-9506", }, ], }
suse-su-2019:3289-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 kernel-azure was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-19531: Fixed a use-after-free due to a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca (bsc#1158445).\n- CVE-2019-19543: Fixed a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bsc#1158427).\n- CVE-2019-19525: Fixed a use-after-free due to a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035 (bsc#1158417).\n- CVE-2019-19530: Fixed a use-after-free due to a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef (bsc#1158410).\n- CVE-2019-19536: Fixed a potential information leak due to a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0 (bsc#1158394).\n- CVE-2019-19524: Fixed a use-after-free due to a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9 (bsc#1158413).\n- CVE-2019-19528: Fixed a use-after-free due to a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d (bsc#1158407).\n- CVE-2019-19534: Fixed a potential information leak due to a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29 (bsc#1158398).\n- CVE-2019-19529: Fixed a use-after-free due to a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41 (bsc#1158381).\n- CVE-2019-14901: Fixed a heap overflow in Marvell WiFi chip driver which could have allowed a remote attacker to cause denial of service or execute arbitrary code (bsc#1157042).\n- CVE-2019-14895: Fixed a heap-based buffer overflow in Marvell WiFi chip driver which may occur when the station attempts a connection negotiation during the handling of the remote devices country settings leading to denial of service (bsc#1157158).\n- CVE-2019-18660: Fixed a potential information leak on powerpc because the Spectre-RSB mitigation was not in place for all applicable CPUs, aka CID-39e72bf96f58 (bsc#1157038).\n- CVE-2019-18683: Fixed a privilege escalation due to multiple race conditions (bsc#1155897).\n- CVE-2019-18809: Fixed a memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c aka CID-2289adbfa559 (bsc#1156258).\n- CVE-2019-19062: Fixed a memory leak in the crypto_report() function in crypto/crypto_user_base.c aka CID-ffdde5932042 (bsc#1157333).\n- CVE-2019-19057: Fixed two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c aka CID-d10dcb615c8e (bsc#1157193).\n- CVE-2019-19056: Fixed a memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c aka CID-db8fd2cde932 (bsc#1157197).\n- CVE-2019-19068: Fixed a memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c aka CID-a2cdd07488e6 (bsc#1157307).\n- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c aka CID-3f9361695113 (bsc#1157298).\n- CVE-2019-19227: Fixed a potential null pointer dereference in the AppleTalk subsystem leadind to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c aka CID-9804501fa122 (bsc#1157678).\n- CVE-2019-19065: Fixed a memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c aka CID-34b3be18a04e (bsc#1157191).\n- CVE-2019-19077: Fixed a memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c aka CID-4a9d46a9fe14 (bsc#1157171).\n- CVE-2019-19052: Fixed a memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c aka CID-fb5be6a7b486 (bsc#1157324).\n- CVE-2019-19067: Fixed multiple memory leaks in acp_hw_init (bsc#1157180).\n- CVE-2019-19060: Fixed a memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c aka CID-ab612b1daf41 (bsc#1157178).\n- CVE-2019-19049: Fixed a memory leak in unittest_data_add (bsc#1157173).\n- CVE-2019-19075: Fixed a memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c aka CID-6402939ec86e (bsc#1157162).\n- CVE-2019-19058: Fixed a memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c aka CID-b4b814fec1a5 (bsc#1157145).\n- CVE-2019-19074: Fixed a memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c aka CID-728c1e2a05e4 (bsc#1157143).\n- CVE-2019-19073: Fixed multiple memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c aka CID-853acf7caf10 (bsc#1157070).\n- CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which would have caused denial of service (bsc#1149448).\n- CVE-2019-16231: Fixed a null pointer dereference in drivers/net/fjes/fjes_main.c (bsc#1150466).\n- CVE-2019-0154: Fixed a local denial of service via read of unprotected i915 registers. (bsc#1135966)\n- CVE-2019-0155: Fixed a privilege escalation in the i915 driver. Batch buffers from usermode could have escalated privileges via blitter command stream. (bsc#1135967)\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n- ALSA: 6fire: Drop the dead code (git-fixes).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- ata: ep93xx: Use proper enums for directions (bsc#1051510).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: fix vdev-start timeout on error (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- ath9k_hw: fix uninitialized variable data (bsc#1051510).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n- Bluetooth: delete a stray unlock (bsc#1051510).\n- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n- brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).\n- Btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n- CIFS: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n- CIFS: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n- CIFS: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n- CIFS: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n- CIFS: fix max ea value size (bsc#1144333, bsc#1154355).\n- CIFS: Fix missed free operations (bsc#1144333, bsc#1154355).\n- CIFS: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n- CIFS: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n- CIFS: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n- CIFS: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n- CIFS: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n- CIFS: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n- CIFS: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n- CIFS: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n- CIFS: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n- CIFS: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n- CIFS: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n- CIFS: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).\n- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n- cpupower: Fix coredump on VMWare (bsc#1051510).\n- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n- crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n- Disable SGL_ALLOC\n- dlm: do not leak kernel pointer to userspace (bsc#1051510).\n- dlm: fix invalid free (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n- docs: move protection-keys.rst to the core-api book (bsc#1078248).\n- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n- e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n- fix SCTP regression (networking-stable-19_10_24 bsc#1158082).\n- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n- HID: Fix assumption that devices have inputs (git-fixes).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n- hypfs: Fix error number left in struct pointer member (bsc#1051510).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- intel_th: Fix a double put_device() in error path (git-fixes).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: check kasprintf() return value (bsc#1051510).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n- kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).\n- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n- livepatch: Basic API to track system state changes (bsc#1071995 ).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n- loop: add ioctl for changing logical block size (bsc#1108043).\n- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n- macvlan: schedule bc_work even if error (bsc#1051510).\n- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: bdisp: fix memleak on release (git-fixes).\n- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n- media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n- media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).\n- media: radio: wl1273: fix interrupt masking on release (git-fixes).\n- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n- media: vim2m: Fix abort issue (git-fixes).\n- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n- mei: fix modalias documentation (git-fixes).\n- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095) \n- mmc: core: fix wl1251 sdio quirks (git-fixes).\n- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).\n- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdio: fix wl1251 vendor id (git-fixes).\n- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n- mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).\n- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n- net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).\n- net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).\n- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n- net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).\n- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n- net: dsa: fix switch tree list (networking-stable-19_11_05).\n- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n- nfc: netlink: fix double device reference drop (git-fixes).\n- nfc: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- nfc: port100: handle command failure cleanly (git-fixes).\n- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n- openvswitch: fix flow command message size (git-fixes).\n- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n- PCI/PME: Fix possible use-after-free on remove (git-fixes).\n- PCI/PTM: Remove spurious 'd' from granularity message (bsc#1051510).\n- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n- PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30 (git-fixes).\n- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).\n- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n- PM / devfreq: passive: fix compiler warning (bsc#1051510).\n- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n- powerpc/bpf: Fix tail call implementation (bsc#1157698).\n- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n- printk: Export console_printk (bsc#1071995).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n- Remove patches that reportedly cause regression (bsc#1155689 ltc#182047).\n- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).\n- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n- Revert 'drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)' This reverts commit 71e3a1b8d8cf73f711f3e4100aa51f68e631f94f. \n- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n- s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n- s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n- s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n- s390: fix stfle zero padding (bsc#1051510).\n- s390/idle: fix cpu idle time calculation (bsc#1051510).\n- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n- s390/process: avoid potential reading of freed stack (bsc#1051510).\n- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n- s390/qeth: return proper errno on IO error (bsc#1051510).\n- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n- s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n- sc16is7xx: Fix for 'Unexpected interrupt: 8' (bsc#1051510).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: Fix use-after-free Read in slip_open (bsc#1051510).\n- smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).\n- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- spi: atmel: Fix CS high support (bsc#1051510).\n- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n- spi: spidev: Fix OF tree warning logic (bsc#1051510).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- supported.conf:\n- synclink_gt(): fix compat_ioctl() (bsc#1051510).\n- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: check msg->req data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n- tipc: compat: allow tipc commands without arguments (bsc#1051510).\n- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n- tipc: handle the err returned from cmd header function (bsc#1051510).\n- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n- tipc: tipc clang warning (bsc#1051510).\n- tpm: add check after commands attribs tab allocation (bsc#1051510).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: msm_serial: Fix flow control (bsc#1051510).\n- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n- UAS: Revert commit 3ae62a42090f ('UAS: fix alignment of scatter/gather segments').\n- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n- USB: chaoskey: fix error case of a timeout (git-fixes).\n- USB: chipidea: Fix otg event handler (bsc#1051510).\n- USB: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- USB: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- USB: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n- USB: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- USB: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- USB: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- USB: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- USB: handle warm-reset port requests on hub resume (bsc#1051510).\n- USBIP: add config dependency for SGL_ALLOC (git-fixes).\n- USBip: Fix free of unallocated memory in vhci tx (git-fixes).\n- USBip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n- USBip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n- USBip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n- USB: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n- USB: serial: mos7720: fix remote wakeup (git-fixes).\n- USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n- USB: serial: mos7840: fix remote wakeup (git-fixes).\n- USB: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n- USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 ('usb-storage: Set virt_boundary_mask to avoid SG overflows') (bsc#1051510).\n- USB: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n- video/hdmi: Fix AVI bar unpack (git-fixes).\n- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n- virtio_ring: fix return code on DMA mapping fails (git-fixes).\n- virtio/s390: fix race on airq_areas (bsc#1051510).\n- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n- watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n- x86/pkeys: Update documentation about availability (bsc#1078248).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xfrm: Fix xfrm sel prefix length validation (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3289,SUSE-SLE-Module-Public-Cloud-15-2019-3289", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3289-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3289-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3289-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html", }, { category: "self", summary: "SUSE Bug 1048942", url: "https://bugzilla.suse.com/1048942", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1082635", url: "https://bugzilla.suse.com/1082635", }, { category: "self", summary: "SUSE Bug 1089644", url: "https://bugzilla.suse.com/1089644", }, { category: "self", summary: "SUSE Bug 1091041", url: "https://bugzilla.suse.com/1091041", }, { category: "self", summary: "SUSE Bug 1108043", url: "https://bugzilla.suse.com/1108043", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1117169", url: "https://bugzilla.suse.com/1117169", }, { category: "self", summary: "SUSE Bug 1120853", url: "https://bugzilla.suse.com/1120853", }, { category: "self", summary: "SUSE Bug 1131107", url: "https://bugzilla.suse.com/1131107", }, { category: "self", summary: "SUSE Bug 1135966", url: "https://bugzilla.suse.com/1135966", }, { category: "self", summary: "SUSE Bug 1135967", url: "https://bugzilla.suse.com/1135967", }, { category: "self", summary: "SUSE Bug 1138039", url: "https://bugzilla.suse.com/1138039", }, { category: "self", summary: "SUSE Bug 1140948", url: "https://bugzilla.suse.com/1140948", }, { category: "self", summary: "SUSE Bug 1141054", url: "https://bugzilla.suse.com/1141054", }, { category: "self", summary: "SUSE Bug 1142095", url: "https://bugzilla.suse.com/1142095", }, { category: "self", summary: "SUSE Bug 1143706", url: "https://bugzilla.suse.com/1143706", }, { category: "self", summary: "SUSE Bug 1144333", url: "https://bugzilla.suse.com/1144333", }, { category: "self", summary: "SUSE Bug 1149448", url: "https://bugzilla.suse.com/1149448", }, { category: "self", summary: "SUSE Bug 1150466", url: "https://bugzilla.suse.com/1150466", }, { category: "self", summary: "SUSE Bug 1151548", url: "https://bugzilla.suse.com/1151548", }, { category: "self", summary: "SUSE Bug 1151900", url: "https://bugzilla.suse.com/1151900", }, { category: "self", summary: "SUSE Bug 1153628", url: "https://bugzilla.suse.com/1153628", }, { category: "self", summary: "SUSE Bug 1153811", url: "https://bugzilla.suse.com/1153811", }, { category: "self", summary: "SUSE Bug 1154043", url: "https://bugzilla.suse.com/1154043", }, { category: "self", summary: "SUSE Bug 1154058", url: "https://bugzilla.suse.com/1154058", }, { category: "self", summary: "SUSE Bug 1154124", url: "https://bugzilla.suse.com/1154124", }, { category: "self", summary: "SUSE Bug 1154355", url: "https://bugzilla.suse.com/1154355", }, { category: "self", summary: "SUSE Bug 1154526", url: "https://bugzilla.suse.com/1154526", }, { category: "self", summary: "SUSE Bug 1155021", url: "https://bugzilla.suse.com/1155021", }, { category: "self", summary: "SUSE Bug 1155689", url: "https://bugzilla.suse.com/1155689", }, { category: "self", summary: "SUSE Bug 1155897", url: "https://bugzilla.suse.com/1155897", }, { category: "self", summary: "SUSE Bug 1155921", url: "https://bugzilla.suse.com/1155921", }, { category: "self", summary: "SUSE Bug 1156258", url: "https://bugzilla.suse.com/1156258", }, { category: "self", summary: "SUSE Bug 1156429", url: "https://bugzilla.suse.com/1156429", }, { category: "self", summary: "SUSE Bug 1156466", url: "https://bugzilla.suse.com/1156466", }, { category: "self", summary: "SUSE Bug 1156471", url: "https://bugzilla.suse.com/1156471", }, { category: "self", summary: "SUSE Bug 1156494", url: "https://bugzilla.suse.com/1156494", }, { category: "self", summary: "SUSE Bug 1156609", url: "https://bugzilla.suse.com/1156609", }, { category: "self", summary: "SUSE Bug 1156700", url: "https://bugzilla.suse.com/1156700", }, { category: "self", summary: "SUSE Bug 1156729", url: "https://bugzilla.suse.com/1156729", }, { category: "self", summary: "SUSE Bug 1156882", url: "https://bugzilla.suse.com/1156882", }, { category: "self", summary: "SUSE Bug 1157038", url: "https://bugzilla.suse.com/1157038", }, { category: "self", summary: "SUSE Bug 1157042", url: "https://bugzilla.suse.com/1157042", }, { category: "self", summary: "SUSE Bug 1157070", url: "https://bugzilla.suse.com/1157070", }, { category: "self", summary: "SUSE Bug 1157143", url: "https://bugzilla.suse.com/1157143", }, { category: "self", summary: "SUSE Bug 1157145", url: "https://bugzilla.suse.com/1157145", }, { category: "self", summary: "SUSE Bug 1157158", url: "https://bugzilla.suse.com/1157158", }, { category: "self", summary: "SUSE Bug 1157162", url: "https://bugzilla.suse.com/1157162", }, { category: "self", summary: "SUSE Bug 1157171", url: "https://bugzilla.suse.com/1157171", }, { category: "self", summary: "SUSE Bug 1157173", url: "https://bugzilla.suse.com/1157173", }, { category: "self", summary: "SUSE Bug 1157178", url: "https://bugzilla.suse.com/1157178", }, { category: "self", summary: "SUSE Bug 1157180", url: "https://bugzilla.suse.com/1157180", }, { category: "self", summary: "SUSE Bug 1157182", url: "https://bugzilla.suse.com/1157182", }, { category: "self", summary: "SUSE Bug 1157183", url: "https://bugzilla.suse.com/1157183", }, { category: "self", summary: "SUSE Bug 1157184", url: "https://bugzilla.suse.com/1157184", }, { category: "self", summary: "SUSE Bug 1157191", url: "https://bugzilla.suse.com/1157191", }, { category: "self", summary: "SUSE Bug 1157193", url: "https://bugzilla.suse.com/1157193", }, { category: "self", summary: "SUSE Bug 1157197", url: "https://bugzilla.suse.com/1157197", }, { category: "self", summary: "SUSE Bug 1157298", url: "https://bugzilla.suse.com/1157298", }, { category: "self", summary: "SUSE Bug 1157307", url: "https://bugzilla.suse.com/1157307", }, { category: "self", summary: "SUSE Bug 1157324", url: "https://bugzilla.suse.com/1157324", }, { category: "self", summary: "SUSE Bug 1157333", url: "https://bugzilla.suse.com/1157333", }, { category: "self", summary: "SUSE Bug 1157424", url: "https://bugzilla.suse.com/1157424", }, { category: "self", summary: "SUSE Bug 1157463", url: "https://bugzilla.suse.com/1157463", }, { category: "self", summary: "SUSE Bug 1157499", url: "https://bugzilla.suse.com/1157499", }, { category: "self", summary: "SUSE Bug 1157678", url: "https://bugzilla.suse.com/1157678", }, { category: "self", summary: "SUSE Bug 1157698", url: "https://bugzilla.suse.com/1157698", }, { category: "self", summary: "SUSE Bug 1157778", url: "https://bugzilla.suse.com/1157778", }, { category: "self", summary: "SUSE Bug 1157908", url: "https://bugzilla.suse.com/1157908", }, { category: "self", summary: "SUSE Bug 1158049", url: "https://bugzilla.suse.com/1158049", }, { category: "self", summary: "SUSE Bug 1158063", url: "https://bugzilla.suse.com/1158063", }, { category: "self", summary: "SUSE Bug 1158064", url: "https://bugzilla.suse.com/1158064", }, { category: "self", summary: "SUSE Bug 1158065", url: "https://bugzilla.suse.com/1158065", }, { category: "self", summary: "SUSE Bug 1158066", url: "https://bugzilla.suse.com/1158066", }, { category: "self", summary: "SUSE Bug 1158067", url: "https://bugzilla.suse.com/1158067", }, { category: "self", summary: "SUSE Bug 1158068", url: "https://bugzilla.suse.com/1158068", }, { category: "self", summary: "SUSE Bug 1158082", url: "https://bugzilla.suse.com/1158082", }, { category: "self", summary: "SUSE Bug 1158381", url: "https://bugzilla.suse.com/1158381", }, { category: "self", summary: "SUSE Bug 1158394", url: "https://bugzilla.suse.com/1158394", }, { category: "self", summary: "SUSE Bug 1158398", url: "https://bugzilla.suse.com/1158398", }, { category: "self", summary: "SUSE Bug 1158407", url: "https://bugzilla.suse.com/1158407", }, { category: "self", summary: "SUSE Bug 1158410", url: "https://bugzilla.suse.com/1158410", }, { category: "self", summary: "SUSE Bug 1158413", url: "https://bugzilla.suse.com/1158413", }, { category: "self", summary: "SUSE Bug 1158417", url: "https://bugzilla.suse.com/1158417", }, { category: "self", summary: "SUSE Bug 1158427", url: "https://bugzilla.suse.com/1158427", }, { category: "self", summary: "SUSE Bug 1158445", url: "https://bugzilla.suse.com/1158445", }, { category: "self", summary: "SUSE CVE CVE-2019-0154 page", url: "https://www.suse.com/security/cve/CVE-2019-0154/", }, { category: "self", summary: "SUSE CVE CVE-2019-0155 page", url: "https://www.suse.com/security/cve/CVE-2019-0155/", }, { category: "self", summary: "SUSE CVE CVE-2019-14895 page", url: "https://www.suse.com/security/cve/CVE-2019-14895/", }, { category: "self", summary: "SUSE CVE CVE-2019-14901 page", url: "https://www.suse.com/security/cve/CVE-2019-14901/", }, { category: "self", summary: "SUSE CVE CVE-2019-15916 page", url: "https://www.suse.com/security/cve/CVE-2019-15916/", }, { category: "self", summary: "SUSE CVE CVE-2019-16231 page", url: "https://www.suse.com/security/cve/CVE-2019-16231/", }, { category: "self", summary: "SUSE CVE CVE-2019-18660 page", url: "https://www.suse.com/security/cve/CVE-2019-18660/", }, { category: "self", summary: "SUSE CVE CVE-2019-18683 page", url: "https://www.suse.com/security/cve/CVE-2019-18683/", }, { category: "self", summary: "SUSE CVE CVE-2019-18809 page", url: "https://www.suse.com/security/cve/CVE-2019-18809/", }, { category: "self", summary: "SUSE CVE CVE-2019-19049 page", url: "https://www.suse.com/security/cve/CVE-2019-19049/", }, { category: "self", summary: "SUSE CVE CVE-2019-19052 page", url: "https://www.suse.com/security/cve/CVE-2019-19052/", }, { category: "self", summary: "SUSE CVE CVE-2019-19056 page", url: "https://www.suse.com/security/cve/CVE-2019-19056/", }, { category: "self", summary: "SUSE CVE CVE-2019-19057 page", url: "https://www.suse.com/security/cve/CVE-2019-19057/", }, { category: "self", summary: "SUSE CVE CVE-2019-19058 page", url: "https://www.suse.com/security/cve/CVE-2019-19058/", }, { category: "self", summary: "SUSE CVE CVE-2019-19060 page", url: "https://www.suse.com/security/cve/CVE-2019-19060/", }, { category: "self", summary: "SUSE CVE CVE-2019-19062 page", url: "https://www.suse.com/security/cve/CVE-2019-19062/", }, { category: "self", summary: "SUSE CVE CVE-2019-19063 page", url: "https://www.suse.com/security/cve/CVE-2019-19063/", }, { category: "self", summary: "SUSE CVE CVE-2019-19065 page", url: "https://www.suse.com/security/cve/CVE-2019-19065/", }, { category: "self", summary: "SUSE CVE CVE-2019-19067 page", url: "https://www.suse.com/security/cve/CVE-2019-19067/", }, { category: "self", summary: "SUSE CVE CVE-2019-19068 page", url: "https://www.suse.com/security/cve/CVE-2019-19068/", }, { category: "self", summary: "SUSE CVE CVE-2019-19073 page", url: "https://www.suse.com/security/cve/CVE-2019-19073/", }, { category: "self", summary: "SUSE CVE CVE-2019-19074 page", url: "https://www.suse.com/security/cve/CVE-2019-19074/", }, { category: "self", summary: "SUSE CVE CVE-2019-19075 page", url: "https://www.suse.com/security/cve/CVE-2019-19075/", }, { category: "self", summary: "SUSE CVE CVE-2019-19077 page", url: "https://www.suse.com/security/cve/CVE-2019-19077/", }, { category: "self", summary: "SUSE CVE CVE-2019-19227 page", url: "https://www.suse.com/security/cve/CVE-2019-19227/", }, { category: "self", summary: "SUSE CVE CVE-2019-19524 page", url: "https://www.suse.com/security/cve/CVE-2019-19524/", }, { category: "self", summary: "SUSE CVE CVE-2019-19525 page", url: "https://www.suse.com/security/cve/CVE-2019-19525/", }, { category: "self", summary: "SUSE CVE CVE-2019-19528 page", url: "https://www.suse.com/security/cve/CVE-2019-19528/", }, { category: "self", summary: "SUSE CVE CVE-2019-19529 page", url: "https://www.suse.com/security/cve/CVE-2019-19529/", }, { category: "self", summary: "SUSE CVE CVE-2019-19530 page", url: "https://www.suse.com/security/cve/CVE-2019-19530/", }, { category: "self", summary: "SUSE CVE CVE-2019-19531 page", url: "https://www.suse.com/security/cve/CVE-2019-19531/", }, { category: "self", summary: "SUSE CVE CVE-2019-19534 page", url: "https://www.suse.com/security/cve/CVE-2019-19534/", }, { category: "self", summary: "SUSE CVE CVE-2019-19536 page", url: "https://www.suse.com/security/cve/CVE-2019-19536/", }, { category: "self", summary: "SUSE CVE CVE-2019-19543 page", url: "https://www.suse.com/security/cve/CVE-2019-19543/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-12-12T14:52:54Z", generator: { date: "2019-12-12T14:52:54Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3289-1", initial_release_date: "2019-12-12T14:52:54Z", revision_history: [ { date: "2019-12-12T14:52:54Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-4.12.14-5.47.1.noarch", product: { name: "kernel-devel-azure-4.12.14-5.47.1.noarch", product_id: "kernel-devel-azure-4.12.14-5.47.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.12.14-5.47.1.noarch", product: { name: "kernel-source-azure-4.12.14-5.47.1.noarch", product_id: "kernel-source-azure-4.12.14-5.47.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-4.12.14-5.47.1.x86_64", product: { name: "cluster-md-kmp-azure-4.12.14-5.47.1.x86_64", product_id: "cluster-md-kmp-azure-4.12.14-5.47.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-4.12.14-5.47.1.x86_64", product: { name: "dlm-kmp-azure-4.12.14-5.47.1.x86_64", product_id: "dlm-kmp-azure-4.12.14-5.47.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-4.12.14-5.47.1.x86_64", product: { name: "gfs2-kmp-azure-4.12.14-5.47.1.x86_64", product_id: "gfs2-kmp-azure-4.12.14-5.47.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-4.12.14-5.47.1.x86_64", product: { name: "kernel-azure-4.12.14-5.47.1.x86_64", product_id: "kernel-azure-4.12.14-5.47.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.12.14-5.47.1.x86_64", product: { name: "kernel-azure-base-4.12.14-5.47.1.x86_64", product_id: "kernel-azure-base-4.12.14-5.47.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.12.14-5.47.1.x86_64", product: { name: "kernel-azure-devel-4.12.14-5.47.1.x86_64", product_id: "kernel-azure-devel-4.12.14-5.47.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-4.12.14-5.47.1.x86_64", product: { name: "kernel-azure-extra-4.12.14-5.47.1.x86_64", product_id: "kernel-azure-extra-4.12.14-5.47.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-4.12.14-5.47.1.x86_64", product: { name: "kernel-azure-livepatch-devel-4.12.14-5.47.1.x86_64", product_id: "kernel-azure-livepatch-devel-4.12.14-5.47.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.12.14-5.47.1.x86_64", product: { name: "kernel-syms-azure-4.12.14-5.47.1.x86_64", product_id: "kernel-syms-azure-4.12.14-5.47.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-4.12.14-5.47.1.x86_64", product: { name: "kselftests-kmp-azure-4.12.14-5.47.1.x86_64", product_id: "kselftests-kmp-azure-4.12.14-5.47.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-4.12.14-5.47.1.x86_64", product: { name: "ocfs2-kmp-azure-4.12.14-5.47.1.x86_64", product_id: "ocfs2-kmp-azure-4.12.14-5.47.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-4.12.14-5.47.1.x86_64", product: { name: "reiserfs-kmp-azure-4.12.14-5.47.1.x86_64", product_id: "reiserfs-kmp-azure-4.12.14-5.47.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-5.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", }, product_reference: "kernel-azure-4.12.14-5.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-5.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-5.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-5.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-5.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-5.47.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-5.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-5.47.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-5.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-5.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", product_id: "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-5.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0154", }, ], notes: [ { category: "general", text: "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0154", url: "https://www.suse.com/security/cve/CVE-2019-0154", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0154", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2019-0154", url: "https://bugzilla.suse.com/1181720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "important", }, ], title: "CVE-2019-0154", }, { cve: "CVE-2019-0155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0155", }, ], notes: [ { category: "general", text: "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0155", url: "https://www.suse.com/security/cve/CVE-2019-0155", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0155", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1135967 for CVE-2019-0155", url: "https://bugzilla.suse.com/1135967", }, { category: "external", summary: "SUSE Bug 1173663 for CVE-2019-0155", url: "https://bugzilla.suse.com/1173663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "important", }, ], title: "CVE-2019-0155", }, { cve: "CVE-2019-14895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14895", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14895", url: "https://www.suse.com/security/cve/CVE-2019-14895", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1157158 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157158", }, { category: "external", summary: "SUSE Bug 1173100 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173100", }, { category: "external", summary: "SUSE Bug 1173660 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "important", }, ], title: "CVE-2019-14895", }, { cve: "CVE-2019-14901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14901", }, ], notes: [ { category: "general", text: "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14901", url: "https://www.suse.com/security/cve/CVE-2019-14901", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14901", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1173661 for CVE-2019-14901", url: "https://bugzilla.suse.com/1173661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "important", }, ], title: "CVE-2019-14901", }, { cve: "CVE-2019-15916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15916", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15916", url: "https://www.suse.com/security/cve/CVE-2019-15916", }, { category: "external", summary: "SUSE Bug 1149448 for CVE-2019-15916", url: "https://bugzilla.suse.com/1149448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "low", }, ], title: "CVE-2019-15916", }, { cve: "CVE-2019-16231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16231", }, ], notes: [ { category: "general", text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16231", url: "https://www.suse.com/security/cve/CVE-2019-16231", }, { category: "external", summary: "SUSE Bug 1150466 for CVE-2019-16231", url: "https://bugzilla.suse.com/1150466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "low", }, ], title: "CVE-2019-16231", }, { cve: "CVE-2019-18660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18660", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18660", url: "https://www.suse.com/security/cve/CVE-2019-18660", }, { category: "external", summary: "SUSE Bug 1157038 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157038", }, { category: "external", summary: "SUSE Bug 1157923 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-18660", }, { cve: "CVE-2019-18683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18683", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18683", url: "https://www.suse.com/security/cve/CVE-2019-18683", }, { category: "external", summary: "SUSE Bug 1155897 for CVE-2019-18683", url: "https://bugzilla.suse.com/1155897", }, { category: "external", summary: "SUSE Bug 1173868 for CVE-2019-18683", url: "https://bugzilla.suse.com/1173868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-18683", }, { cve: "CVE-2019-18809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18809", }, ], notes: [ { category: "general", text: "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18809", url: "https://www.suse.com/security/cve/CVE-2019-18809", }, { category: "external", summary: "SUSE Bug 1156258 for CVE-2019-18809", url: "https://bugzilla.suse.com/1156258", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-18809", }, { cve: "CVE-2019-19049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19049", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19049", url: "https://www.suse.com/security/cve/CVE-2019-19049", }, { category: "external", summary: "SUSE Bug 1157173 for CVE-2019-19049", url: "https://bugzilla.suse.com/1157173", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19049", }, { cve: "CVE-2019-19052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19052", }, ], notes: [ { category: "general", text: "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19052", url: "https://www.suse.com/security/cve/CVE-2019-19052", }, { category: "external", summary: "SUSE Bug 1157324 for CVE-2019-19052", url: "https://bugzilla.suse.com/1157324", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19052", }, { cve: "CVE-2019-19056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19056", }, ], notes: [ { category: "general", text: "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19056", url: "https://www.suse.com/security/cve/CVE-2019-19056", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19056", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19057", }, ], notes: [ { category: "general", text: "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19057", url: "https://www.suse.com/security/cve/CVE-2019-19057", }, { category: "external", summary: "SUSE Bug 1157193 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157193", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "low", }, ], title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19058", }, ], notes: [ { category: "general", text: "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19058", url: "https://www.suse.com/security/cve/CVE-2019-19058", }, { category: "external", summary: "SUSE Bug 1157145 for CVE-2019-19058", url: "https://bugzilla.suse.com/1157145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19058", }, { cve: "CVE-2019-19060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19060", }, ], notes: [ { category: "general", text: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19060", url: "https://www.suse.com/security/cve/CVE-2019-19060", }, { category: "external", summary: "SUSE Bug 1157178 for CVE-2019-19060", url: "https://bugzilla.suse.com/1157178", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19060", }, { cve: "CVE-2019-19062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19062", }, ], notes: [ { category: "general", text: "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19062", url: "https://www.suse.com/security/cve/CVE-2019-19062", }, { category: "external", summary: "SUSE Bug 1157333 for CVE-2019-19062", url: "https://bugzilla.suse.com/1157333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19063", }, ], notes: [ { category: "general", text: "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19063", url: "https://www.suse.com/security/cve/CVE-2019-19063", }, { category: "external", summary: "SUSE Bug 1157298 for CVE-2019-19063", url: "https://bugzilla.suse.com/1157298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19063", }, { cve: "CVE-2019-19065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19065", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19065", url: "https://www.suse.com/security/cve/CVE-2019-19065", }, { category: "external", summary: "SUSE Bug 1157191 for CVE-2019-19065", url: "https://bugzilla.suse.com/1157191", }, { category: "external", summary: "SUSE Bug 1173961 for CVE-2019-19065", url: "https://bugzilla.suse.com/1173961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "important", }, ], title: "CVE-2019-19065", }, { cve: "CVE-2019-19067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19067", }, ], notes: [ { category: "general", text: "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19067", url: "https://www.suse.com/security/cve/CVE-2019-19067", }, { category: "external", summary: "SUSE Bug 1157180 for CVE-2019-19067", url: "https://bugzilla.suse.com/1157180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19068", }, ], notes: [ { category: "general", text: "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19068", url: "https://www.suse.com/security/cve/CVE-2019-19068", }, { category: "external", summary: "SUSE Bug 1157307 for CVE-2019-19068", url: "https://bugzilla.suse.com/1157307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19068", }, { cve: "CVE-2019-19073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19073", }, ], notes: [ { category: "general", text: "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19073", url: "https://www.suse.com/security/cve/CVE-2019-19073", }, { category: "external", summary: "SUSE Bug 1157070 for CVE-2019-19073", url: "https://bugzilla.suse.com/1157070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19074", }, ], notes: [ { category: "general", text: "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19074", url: "https://www.suse.com/security/cve/CVE-2019-19074", }, { category: "external", summary: "SUSE Bug 1157143 for CVE-2019-19074", url: "https://bugzilla.suse.com/1157143", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19075", }, ], notes: [ { category: "general", text: "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19075", url: "https://www.suse.com/security/cve/CVE-2019-19075", }, { category: "external", summary: "SUSE Bug 1157162 for CVE-2019-19075", url: "https://bugzilla.suse.com/1157162", }, { category: "external", summary: "SUSE Bug 1173958 for CVE-2019-19075", url: "https://bugzilla.suse.com/1173958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "low", }, ], title: "CVE-2019-19075", }, { cve: "CVE-2019-19077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19077", }, ], notes: [ { category: "general", text: "A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19077", url: "https://www.suse.com/security/cve/CVE-2019-19077", }, { category: "external", summary: "SUSE Bug 1157171 for CVE-2019-19077", url: "https://bugzilla.suse.com/1157171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19077", }, { cve: "CVE-2019-19227", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19227", }, ], notes: [ { category: "general", text: "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19227", url: "https://www.suse.com/security/cve/CVE-2019-19227", }, { category: "external", summary: "SUSE Bug 1157678 for CVE-2019-19227", url: "https://bugzilla.suse.com/1157678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19227", }, { cve: "CVE-2019-19524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19524", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19524", url: "https://www.suse.com/security/cve/CVE-2019-19524", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158413 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158413", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "low", }, ], title: "CVE-2019-19524", }, { cve: "CVE-2019-19525", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19525", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19525", url: "https://www.suse.com/security/cve/CVE-2019-19525", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158417 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158417", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19525", }, { cve: "CVE-2019-19528", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19528", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19528", url: "https://www.suse.com/security/cve/CVE-2019-19528", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158407 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158407", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19528", }, { cve: "CVE-2019-19529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19529", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19529", url: "https://www.suse.com/security/cve/CVE-2019-19529", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19529", }, { cve: "CVE-2019-19530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19530", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19530", url: "https://www.suse.com/security/cve/CVE-2019-19530", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158410 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158410", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "moderate", }, ], title: "CVE-2019-19530", }, { cve: "CVE-2019-19531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19531", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19531", url: "https://www.suse.com/security/cve/CVE-2019-19531", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158427", }, { category: "external", summary: "SUSE Bug 1158445 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158445", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "low", }, ], title: "CVE-2019-19531", }, { cve: "CVE-2019-19534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19534", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19534", url: "https://www.suse.com/security/cve/CVE-2019-19534", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158398 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158398", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "low", }, ], title: "CVE-2019-19534", }, { cve: "CVE-2019-19536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19536", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19536", url: "https://www.suse.com/security/cve/CVE-2019-19536", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158394 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158394", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "low", }, ], title: "CVE-2019-19536", }, { cve: "CVE-2019-19543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19543", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19543", url: "https://www.suse.com/security/cve/CVE-2019-19543", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19543", url: "https://bugzilla.suse.com/1158427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T14:52:54Z", details: "low", }, ], title: "CVE-2019-19543", }, ], }
suse-su-2020:0599-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP4 real-time kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-14615: An information disclosure vulnerability existed due to insufficient control flow in certain data structures for some Intel(R) Processors (bnc#1160195).\n- CVE-2019-14895: A heap-based buffer overflow was discovered in the Marvell WiFi driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-14896: A heap overflow was found in the add_ie_rates() function of the Marvell Wifi Driver (bsc#1157157).\n- CVE-2019-14897: A stack overflow was found in the lbs_ibss_join_existing() function of the Marvell Wifi Driver (bsc#1157155).\n- CVE-2019-14901: A heap overflow flaw was found in the Marvell WiFi driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code (bnc#1157042).\n- CVE-2019-15213: A use-after-free bug caused by a malicious USB device was found in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).\n- CVE-2019-16994: A memory leak existed in sit_init_net() in net/ipv6/sit.c which might have caused denial of service, aka CID-07f12b26e21a (bnc#1161523).\n- CVE-2019-18660: An information disclosure bug occured because the Spectre-RSB mitigation were not in place for all applicable CPUs, aka CID-39e72bf96f58 (bnc#1157038).\n- CVE-2019-18683: Multiple race conditions were discovered in drivers/media/platform/vivid. It was exploitable for privilege escalation if local users had access to /dev/video0, but only if the driver happened to be loaded. At least one of these race conditions led to a use-after-free (bnc#1155897).\n- CVE-2019-18808: A memory leak in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption), aka CID-128c66429247 (bnc#1156259).\n- CVE-2019-18809: A memory leak in drivers/media/usb/dvb-usb/af9005.c allowed attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559 (bnc#1156258).\n- CVE-2019-19036: An issue discovered in btrfs_root_node in fs/btrfs/ctree.c allowed a NULL pointer dereference because rcu_dereference(root->node) can be zero (bnc#1157692).\n- CVE-2019-19045: A memory leak in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7 (bnc#1161522).\n- CVE-2019-19051: A memory leak in drivers/net/wimax/i2400m/op-rfkill.c allowed attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7 (bnc#1159024).\n- CVE-2019-19052: A memory leak in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption), aka CID-fb5be6a7b486 (bnc#1157324).\n- CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b (bnc#1161518).\n- CVE-2019-19056: A memory leak in drivers/net/wireless/marvell/mwifiex/pcie.c allowed attackers to cause a denial of service (memory consumption), aka CID-db8fd2cde932 (bnc#1157197).\n- CVE-2019-19057: Two memory leaks in drivers/net/wireless/marvell/mwifiex/pcie.c allowed attackers to cause a denial of service (memory consumption), aka CID-d10dcb615c8e (bnc#1157193 bsc#1157197).\n- CVE-2019-19058: A memory leak in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allowed attackers to cause a denial of service (memory consumption), aka CID-b4b814fec1a5 (bnc#1157145).\n- CVE-2019-19060: A memory leak in drivers/iio/imu/adis_buffer.c allowed attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41 (bnc#1157178).\n- CVE-2019-19062: A memory leak in crypto/crypto_user_base.c allowed attackers to cause a denial of service (memory consumption), aka CID-ffdde5932042 (bnc#1157333).\n- CVE-2019-19063: Two memory leaks in drivers/net/wireless/realtek/rtlwifi/usb.c allowed attackers to cause a denial of service (memory consumption), aka CID-3f9361695113 (bnc#1157298).\n- CVE-2019-19065: A memory leak in drivers/infiniband/hw/hfi1/sdma.c allowed attackers to cause a denial of service (memory consumption), aka CID-34b3be18a04e (bnc#1157191).\n- CVE-2019-19066: A memory leak in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service (memory consumption), aka CID-0e62395da2bd (bnc#1157303).\n- CVE-2019-19067: There were four unlikely memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c (bnc#1157180).\n- CVE-2019-19068: A memory leak in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allowed attackers to cause a denial of service (memory consumption), aka CID-a2cdd07488e6 (bnc#1157307).\n- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption), aka CID-853acf7caf10 (bnc#1157070).\n- CVE-2019-19074: A memory leak in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4 (bnc#1157143).\n- CVE-2019-19075: A memory leak in drivers/net/ieee802154/ca8210.c allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e (bnc#1157162).\n- CVE-2019-19077: A memory leak in drivers/infiniband/hw/bnxt_re/ib_verbs.c allowed attackers to cause a denial of service (memory consumption), aka CID-4a9d46a9fe14 (bnc#1157171).\n- CVE-2019-19227: In the AppleTalk subsystem there was a potential NULL pointer dereference because register_snap_client may return NULL. This could have led to denial of service, aka CID-9804501fa122 (bnc#1157678).\n- CVE-2019-19318: Mounting a crafted btrfs image twice could have caused a use-after-free (bnc#1158026).\n- CVE-2019-19319: A slab-out-of-bounds write access could have occured when setxattr was called after mounting of a specially crafted ext4 image (bnc#1158021).\n- CVE-2019-19332: An out-of-bounds memory write issue was found in the way the KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could have used this flaw to crash the system (bnc#1158827).\n- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting could have led to a use-after-free in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19523: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bsc#1158823).\n- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9 (bsc#1158413).\n- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035 (bsc#1158417).\n- CVE-2019-19526: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098 (bsc#1158893).\n- CVE-2019-19527: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e (bsc#1158900).\n- CVE-2019-19528: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d (bsc#1158407).\n- CVE-2019-19529: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41 (bnc#1158381).\n- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef (bsc#1158410).\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca (bsc#1158445).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that can be caused by a malicious USB HID device, aka CID-d9d4b1e46d95 (bsc#1158824).\n- CVE-2019-19533: There was an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464 (bsc#1158834).\n- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29 (bsc#1158398).\n- CVE-2019-19535: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042 (bsc#1158903).\n- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0 (bsc#1158394).\n- CVE-2019-19537: There was a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9 (bsc#1158904).\n- CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).\n- CVE-2019-19767: There were multiple use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163 (bnc#1159297).\n- CVE-2019-19965: There was a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5 (bnc#1159911).\n- CVE-2019-19966: There was a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that could have caused a denial of service, aka CID-dea37a972655 (bnc#1159841).\n- CVE-2019-20054: There was a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e (bnc#1159910).\n- CVE-2019-20095: Several memory leaks were found in drivers/net/wireless/marvell/mwifiex/cfg80211.c, aka CID-003b686ace82 (bnc#1159909).\n- CVE-2019-20096: There was a memory leak in __feat_register_sp() in net/dccp/feat.c, aka CID-1d3ff0950e2b (bnc#1159908).\n- CVE-2020-7053: There was a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c (bnc#1160966).\n- CVE-2019-19338: There was an incomplete fix for an issue with Transactional Synchronisation Extensions in the KVM code (bsc#1158954).\n- CVE-2019-19049: There was an unlikely memory leak in unittest_data_add (bsc#1157173).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).\n- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- ACPI: OSL: only free map once in osl.c (bsc#1051510).\n- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).\n- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: 6fire: Drop the dead code (git-fixes).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).\n- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).\n- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).\n- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).\n- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- apparmor: fix unsigned len comparison with less than zero (git-fixes).\n- appledisplay: fix error handling in the scheduled work (git-fixes).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).\n- ASoC: cs4349: Use PM ops 'cs4349_runtime_pm' (bsc#1051510).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ata: ep93xx: Use proper enums for directions (bsc#1051510).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: fix vdev-start timeout on error (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n- ath6kl: Fix off by one error in scan completion (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- ath9k_hw: fix uninitialized variable data (bsc#1051510).\n- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).\n- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcma: remove set but not used variable 'sizel' (git-fixes).\n- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n- Bluetooth: delete a stray unlock (bsc#1051510).\n- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).\n- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).\n- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).\n- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).\n- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can, slip: Protect tty->disc_data in write_wakeup and close with RCU (bsc#1051510).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: peak_usb: report bus recovery as well (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).\n- cgroup: pids: use atomic64_t for pids->limit (bsc#1161514).\n- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n- cifs: add support for flock (bsc#1144333).\n- cifs: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n- cifs: Close cached root handle only if it had a lease (bsc#1144333).\n- cifs: Close open handle after interrupted close (bsc#1144333).\n- cifs: close the shared root handle on tree disconnect (bsc#1144333).\n- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n- cifs: Do not miss cancelled OPEN responses (bsc#1144333).\n- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n- cifs: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- cifs: fix max ea value size (bsc#1144333, bsc#1154355).\n- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n- cifs: Fix mount options set in automount (bsc#1144333).\n- cifs: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- cifs: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- cifs: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- cifs: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n- cifs: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n- cifs: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- cifs: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n- cifs: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n- cifs: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n- cifs: Properly process SMB3 lease breaks (bsc#1144333).\n- cifs: remove set but not used variables 'cinode' and 'netfid' (bsc#1144333).\n- cifs: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n- cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- configfs_register_group() shouldn't be (and isn't) called in rmdirable parts (bsc#1051510).\n- copy/pasted 'Recommends:' instead of 'Provides:', 'Obsoletes:' and 'Conflicts:\n- Cover up kABI breakage due to DH key verification (bsc#1155331).\n- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).\n- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n- cpupower: Fix coredump on VMWare (bsc#1051510).\n- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn->alg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n- crypto: dh - add public key verification test (bsc#1155331).\n- crypto: dh - fix calculating encoded key size (bsc#1155331).\n- crypto: dh - fix memory leak (bsc#1155331).\n- crypto: dh - update test for public key verification (bsc#1155331).\n- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n- crypto: ecdh - add public key verification test (bsc#1155331).\n- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).\n- crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n- dlm: do not leak kernel pointer to userspace (bsc#1051510).\n- dlm: fix invalid free (bsc#1051510).\n- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n- docs: move protection-keys.rst to the core-api book (bsc#1078248).\n- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).\n- drivers/regulator: fix a missing check of return value (bsc#1051510).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915: Add missing include file <linux/math64.h> (bsc#1051510).\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)\n- e1000e: Add support for Comet Lake (bsc#1158533).\n- e1000e: Add support for Tiger Lake (bsc#1158533).\n- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n- e1000e: Increase pause and refresh time (bsc#1158533).\n- e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n- e100: Fix passing zero to 'PTR_ERR' warning in e100_load_ucode_wait (bsc#1051510).\n- ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable (bsc#1158646).\n- ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either (bsc#1158647).\n- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- ext4: fix punch hole for inline_data file systems (bsc#1158640).\n- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).\n- HID: Fix assumption that devices have inputs (git-fixes).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).\n- hypfs: Fix error number left in struct pointer member (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n- init: add arch_call_rest_init to allow stack switching (jsc#SLE-11179).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- intel_th: Fix a double put_device() in error path (git-fixes).\n- iomap: Fix pipe page leakage during splicing (bsc#1158651).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).\n- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: check kasprintf() return value (bsc#1051510).\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n- kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n- kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).\n- kABI: protect struct sctp_ep_common (kabi).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n- kexec: bail out upon SIGKILL when allocating memory (git-fixes).\n- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).\n- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).\n- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n- KVM: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).\n- KVM: x86: Remove a spurious export of a static function (bsc#1158954).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n- livepatch: Basic API to track system state changes (bsc#1071995 ).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n- livepatch: Simplify stack trace retrieval (jsc#SLE-11179).\n- loop: add ioctl for changing logical block size (bsc#1108043).\n- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- mac80211: fix station inactive_time shortly after boot (bsc#1051510).\n- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: schedule bc_work even if error (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).\n- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: bdisp: fix memleak on release (git-fixes).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n- media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n- media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n- media: ov6650: Fix control handler not freed on init error (git-fixes).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).\n- media: radio: wl1273: fix interrupt masking on release (git-fixes).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n- media: uvcvideo: Fix error path in control parsing failure (git-fixes).\n- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).\n- media: vim2m: Fix abort issue (git-fixes).\n- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n- mei: bus: prefix device names on bus with the bus name (bsc#1051510).\n- mei: fix modalias documentation (git-fixes).\n- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b ('rpm/kernel-subpackage-spec: Unify dependency handling.') Fixes: 3fd22e219f77 ('rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)')\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).\n- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).\n- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mmc: core: fix wl1251 sdio quirks (git-fixes).\n- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: Revert 'mmc: sdhci-of-esdhc: add erratum A-009204 support' (bsc#1051510).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: sdio: fix wl1251 vendor id (git-fixes).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- moduleparam: fix parameter description mismatch (bsc#1051510).\n- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).\n- nbd: prevent memory leak (bsc#1158638).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net/smc: avoid fallback in case of non-blocking connect (git-fixes).\n- net/smc: fix closing of fallback SMC sockets (git-fixes).\n- net/smc: Fix error path in smc_init (git-fixes).\n- net/smc: fix ethernet interface refcounting (git-fixes).\n- net/smc: fix refcounting for non-blocking connect() (git-fixes).\n- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).\n- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).\n- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n- net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).\n- net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).\n- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n- net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n- net: dsa: fix switch tree list (networking-stable-19_11_05).\n- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).\n- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: Check against net_device being NULL (bsc#1051510).\n- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).\n- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).\n- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).\n- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).\n- net: phy: marvell: clear wol event before setting it (bsc#1051510).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: meson-gxl: check phy_write return value (bsc#1051510).\n- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: mscc: read 'vsc8531, edge-slowdown' as an u32 (bsc#1051510).\n- net: phy: mscc: read 'vsc8531,vddmac' as an u32 (bsc#1051510).\n- net: phy: xgene: disable clk on error paths (bsc#1051510).\n- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).\n- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).\n- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n- nfc: fdp: fix incorrect free object (networking-stable-19_11_10).\n- nfc: netlink: fix double device reference drop (git-fixes).\n- nfc: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- nfc: pn533: fix bulk-message timeout (bsc#1051510).\n- nfc: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- nfc: port100: handle command failure cleanly (git-fixes).\n- nfc: st21nfca: fix double free (networking-stable-19_11_10).\n- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n- ocfs2: fix passing zero to 'PTR_ERR' warning (bsc#1158649).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: fix flow command message size (git-fixes).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).\n- PCI/PME: Fix possible use-after-free on remove (git-fixes).\n- PCI/PTM: Remove spurious 'd' from granularity message (bsc#1051510).\n- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n- PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30 (git-fixes).\n- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).\n- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).\n- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n- PM / devfreq: passive: fix compiler warning (bsc#1051510).\n- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).\n- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n- powerpc/bpf: Fix tail call implementation (bsc#1157698).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/livepatch: return -ERRNO values in save_stack_trace_tsk_reliable() (bsc#1071995 bsc#1161875).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/pseries/lparcfg: Fix display of Maximum Memory (bsc#1162028 ltc#181740).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n- powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init() (git-fixes).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges >4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges >4GB (bnc#1151927 5.3.17).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- printk: Export console_printk (bsc#1071995).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- pwm: Clear chip_data in pwm_put() (bsc#1051510).\n- pwm: clps711x: Fix period calculation (bsc#1051510).\n- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).\n- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- random: move FIPS continuous test to output functions (bsc#1155334).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- RDMA/hns: Prevent memory leaks of eq->buf_list (bsc#1104427 ).\n- README.BRANCH: removing myself from the maintainer list\n- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- regulator: tps65910: fix a missing check of return value (bsc#1051510).\n- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).\n- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_ops kerneldoc comment (bsc#1051510).\n- resource: fix locking in find_next_iomem_res() (bsc#1114279).\n- Revert 'ath10k: fix DMA related firmware crashes on multiple devices' (git-fixes).\n- Revert 'Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers' (bsc#1051510).\n- Revert 'mmc: sdhci: Fix incorrect switch to HS mode' (bsc#1051510).\n- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages\n- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n- rpm/kernel-subpackage-spec: fix kernel-default-base build There were some issues with recent changes to subpackage dependencies handling:\n- rpm/kernel-subpackage-spec: Unify dependency handling.\n- rpm/modules.fips: update module list (bsc#1157853)\n- rsi_91x_usb: fix interface sanity check (git-fixes).\n- rt2800: remove errornous duplicate condition (git-fixes).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in 'max8997_rtc_read_alarm()' (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf's type to u8 in s35390a_init (bsc#1051510).\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtl818x: fix potential use after free (bsc#1051510).\n- rtl8xxxu: fix interface sanity check (git-fixes).\n- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n- s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n- s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n- s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n- s390/ftrace: generate traced function stack frame (jsc#SLE-11178 jsc#SLE-11179).\n- s390/ftrace: save traced function caller (jsc#SLE-11179).\n- s390/ftrace: use HAVE_FUNCTION_GRAPH_RET_ADDR_PTR (jsc#SLE-11179).\n- s390/head64: correct init_task stack setup (jsc#SLE-11179).\n- s390/idle: fix cpu idle time calculation (bsc#1051510).\n- s390/kasan: avoid false positives during stack unwind (jsc#SLE-11179).\n- s390/kasan: avoid report in get_wchan (jsc#SLE-11179).\n- s390/livepatch: Implement reliable stack tracing for the consistency model (jsc#SLE-11179).\n- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n- s390/process: avoid custom stack unwinding in get_wchan (jsc#SLE-11179).\n- s390/process: avoid potential reading of freed stack (bsc#1051510).\n- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n- s390/qeth: clean up page frag creation (git-fixes).\n- s390/qeth: consolidate skb allocation (git-fixes).\n- s390/qeth: ensure linear access to packet headers (git-fixes).\n- s390/qeth: guard against runt packets (git-fixes).\n- s390/qeth: return proper errno on IO error (bsc#1051510).\n- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n- s390/stacktrace: use common arch_stack_walk infrastructure (jsc#SLE-11179).\n- s390/suspend: fix stack setup in swsusp_arch_suspend (jsc#SLE-11179).\n- s390/test_unwind: print verbose unwinding results (jsc#SLE-11179).\n- s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n- s390/unwind: add stack pointer alignment sanity checks (jsc#SLE-11179).\n- s390/unwind: always inline get_stack_pointer (jsc#SLE-11179).\n- s390/unwind: avoid int overflow in outside_of_stack (jsc#SLE-11179).\n- s390/unwind: cleanup unused READ_ONCE_TASK_STACK (jsc#SLE-11179).\n- s390/unwind: correct stack switching during unwind (jsc#SLE-11179).\n- s390/unwind: drop unnecessary code around calling ftrace_graph_ret_addr() (jsc#SLE-11179).\n- s390/unwind: filter out unreliable bogus %r14 (jsc#SLE-11179).\n- s390/unwind: fix get_stack_pointer(NULL, NULL) (jsc#SLE-11179).\n- s390/unwind: fix mixing regs and sp (jsc#SLE-11179).\n- s390/unwind: introduce stack unwind API (jsc#SLE-11179).\n- s390/unwind: make reuse_sp default when unwinding pt_regs (jsc#SLE-11179).\n- s390/unwind: remove stack recursion warning (jsc#SLE-11179).\n- s390/unwind: report an error if pt_regs are not on stack (jsc#SLE-11179).\n- s390/unwind: start unwinding from reliable state (jsc#SLE-11179).\n- s390/unwind: stop gracefully at task pt_regs (jsc#SLE-11179).\n- s390/unwind: stop gracefully at user mode pt_regs in irq stack (jsc#SLE-11179).\n- s390/unwind: unify task is current checks (jsc#SLE-11179).\n- s390: add stack switch helper (jsc#SLE-11179).\n- s390: add support for virtually mapped kernel stacks (jsc#SLE-11179).\n- s390: always inline current_stack_pointer() (jsc#SLE-11179).\n- s390: always inline disabled_wait (jsc#SLE-11179).\n- s390: avoid misusing CALL_ON_STACK for task stack setup (jsc#SLE-11179).\n- s390: clean up stacks setup (jsc#SLE-11179).\n- s390: correct CALL_ON_STACK back_chain saving (jsc#SLE-11179).\n- s390: disable preemption when switching to nodat stack with CALL_ON_STACK (jsc#SLE-11179).\n- s390: fine-tune stack switch helper (jsc#SLE-11179).\n- s390: fix register clobbering in CALL_ON_STACK (jsc#SLE-11179).\n- s390: fix stfle zero padding (bsc#1051510).\n- s390: kabi workaround for ftrace_ret_stack (jsc#SLE-11179).\n- s390: kabi workaround for lowcore changes due to vmap stack (jsc#SLE-11179).\n- s390: kabi workaround for reliable stack tracing (jsc#SLE-11179).\n- s390: preserve kabi for stack unwind API (jsc#SLE-11179).\n- s390: unify stack size definitions (jsc#SLE-11179).\n- sched/fair: Add tmp_alone_branch assertion (bnc#1156462).\n- sched/fair: Fix insertion in rq->leaf_cfs_rq_list (bnc#1156462).\n- sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).\n- sched/fair: Optimize update_blocked_averages() (bnc#1156462).\n- sched/fair: WARN() and refuse to set buddy when !se->on_rq (bsc#1158132).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Correctly retrieve and interpret active flash region (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n- scsi: zfcp: trace channel log even for FCP command responses (git-fixes).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n- serial: max310x: Fix tx_empty() callback (bsc#1051510).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: Fix use-after-free Read in slip_open (bsc#1051510).\n- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).\n- smb3: Fix persistent handles reconnect (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1144333).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- spi: atmel: Fix CS high support (bsc#1051510).\n- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#1051510).\n- spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch (bsc#1051510).\n- spi: omap2-mcspi: Set FIFO DMA trigger level to word length (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n- spi: spidev: Fix OF tree warning logic (bsc#1051510).\n- stacktrace: Do not skip first entry on noncurrent tasks (jsc#SLE-11179).\n- stacktrace: Force USER_DS for stack_trace_save_user() (jsc#SLE-11179).\n- stacktrace: Get rid of unneeded '!!' pattern (jsc#SLE-11179).\n- stacktrace: Provide common infrastructure (jsc#SLE-11179).\n- stacktrace: Provide helpers for common stack trace operations (jsc#SLE-11179).\n- stacktrace: Unbreak stack_trace_save_tsk_reliable() (jsc#SLE-11179).\n- stacktrace: Use PF_KTHREAD to check for kernel threads (jsc#SLE-11179).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: rtl8192e: fix potential use after free (bsc#1051510).\n- staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids (bsc#1051510).\n- staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).\n- stm class: Fix a double free of stm_source_device (bsc#1051510).\n- supported.conf:\n- synclink_gt(): fix compat_ioctl() (bsc#1051510).\n- tcp: clear tp->packets_out when purging write queue (bsc#1160560).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n- thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).\n- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: check msg->req data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n- tipc: compat: allow tipc commands without arguments (bsc#1051510).\n- tipc: fix a missing check of genlmsg_put (bsc#1051510).\n- tipc: fix link name length check (bsc#1051510).\n- tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).\n- tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).\n- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n- tipc: handle the err returned from cmd header function (bsc#1051510).\n- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n- tipc: tipc clang warning (bsc#1051510).\n- tpm: add check after commands attribs tab allocation (bsc#1051510).\n- tracing: Cleanup stack trace code (jsc#SLE-11179).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: msm_serial: Fix flow control (bsc#1051510).\n- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n- uaccess: Add non-pagefault user-space write function (bsc#1083647).\n- ubifs: Correctly initialize c->min_log_bytes (bsc#1158641).\n- ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n- usb: adutux: fix interface sanity check (bsc#1051510).\n- usb: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- usb: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- usb: chaoskey: fix error case of a timeout (git-fixes).\n- usb: chipidea: Fix otg event handler (bsc#1051510).\n- usb: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- usb: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- usb: core: urb: fix URB structure initialization function (bsc#1051510).\n- usb: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- usb: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- usb: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- usb: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n- usb: gadget: pch_udc: fix use after free (bsc#1051510).\n- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- usb: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- usb: idmouse: fix interface sanity checks (bsc#1051510).\n- usb: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n- usb: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n- usb: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- usb: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- usb: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- usb: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).\n- usb: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- usb: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n- usb: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- usb: serial: io_edgeport: use irqsave() in USB's complete callback (bsc#1051510).\n- usb: serial: keyspan: handle unbound ports (bsc#1051510).\n- usb: serial: mos7720: fix remote wakeup (git-fixes).\n- usb: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n- usb: serial: mos7840: fix remote wakeup (git-fixes).\n- usb: serial: opticon: fix control-message timeouts (bsc#1051510).\n- usb: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n- usb: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n- usb: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- usb: serial: quatech2: handle unbound ports (bsc#1051510).\n- usb: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- usb: serial: suppress driver bind attributes (bsc#1051510).\n- usb: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- usb: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- usb: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- usb: xhci: only set D3hot for pci device (bsc#1051510).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n- vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1 (bsc#1051510).\n- video/hdmi: Fix AVI bar unpack (git-fixes).\n- video: backlight: Add devres versions of of_find_backlight (bsc#1090888) Taken for 6010831dde5.\n- video: backlight: Add of_find_backlight helper in backlight.c (bsc#1090888) Taken for 6010831dde5.\n- virtio/s390: fix race on airq_areas (bsc#1051510).\n- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n- virtio_ring: fix return code on DMA mapping fails (git-fixes).\n- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n- watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n- watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n- x86/pkeys: Update documentation about availability (bsc#1078248).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2020-599,SUSE-SLE-RT-12-SP4-2020-599", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0599-1.json", }, { category: "self", summary: "URL for SUSE-SU-2020:0599-1", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200599-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2020:0599-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html", }, { category: "self", summary: "SUSE Bug 1046303", url: "https://bugzilla.suse.com/1046303", }, { category: "self", summary: "SUSE Bug 1050244", url: "https://bugzilla.suse.com/1050244", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1051858", url: "https://bugzilla.suse.com/1051858", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1083647", url: "https://bugzilla.suse.com/1083647", }, { category: "self", summary: "SUSE Bug 1085030", url: "https://bugzilla.suse.com/1085030", }, { category: "self", summary: "SUSE Bug 1086301", url: "https://bugzilla.suse.com/1086301", }, { category: "self", summary: "SUSE Bug 1086313", url: "https://bugzilla.suse.com/1086313", }, { category: "self", summary: "SUSE Bug 1086314", url: "https://bugzilla.suse.com/1086314", }, { category: "self", summary: "SUSE Bug 1089644", url: "https://bugzilla.suse.com/1089644", }, { category: "self", summary: "SUSE Bug 1090888", url: "https://bugzilla.suse.com/1090888", }, { category: "self", summary: "SUSE Bug 1104427", url: "https://bugzilla.suse.com/1104427", }, { category: "self", summary: "SUSE Bug 1108043", url: "https://bugzilla.suse.com/1108043", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1115026", url: "https://bugzilla.suse.com/1115026", }, { category: "self", summary: "SUSE Bug 1117169", url: "https://bugzilla.suse.com/1117169", }, { category: "self", summary: "SUSE Bug 1120853", url: "https://bugzilla.suse.com/1120853", }, { category: "self", summary: "SUSE Bug 1127371", url: "https://bugzilla.suse.com/1127371", }, { category: "self", summary: "SUSE Bug 1134973", url: "https://bugzilla.suse.com/1134973", }, { category: "self", summary: "SUSE Bug 1138039", url: "https://bugzilla.suse.com/1138039", }, { category: "self", summary: "SUSE Bug 1140948", url: "https://bugzilla.suse.com/1140948", }, { category: "self", summary: "SUSE Bug 1141054", url: "https://bugzilla.suse.com/1141054", }, { category: "self", summary: "SUSE Bug 1142095", url: "https://bugzilla.suse.com/1142095", }, { category: "self", summary: "SUSE Bug 1143959", url: "https://bugzilla.suse.com/1143959", }, { category: "self", summary: "SUSE Bug 1144333", url: "https://bugzilla.suse.com/1144333", }, { category: "self", summary: "SUSE Bug 1146519", url: "https://bugzilla.suse.com/1146519", }, { category: "self", summary: "SUSE Bug 1146544", url: "https://bugzilla.suse.com/1146544", }, { category: "self", summary: "SUSE Bug 1151548", url: "https://bugzilla.suse.com/1151548", }, { category: "self", summary: "SUSE Bug 1151900", url: "https://bugzilla.suse.com/1151900", }, { category: "self", summary: "SUSE Bug 1151910", url: "https://bugzilla.suse.com/1151910", }, { category: "self", summary: "SUSE Bug 1151927", url: "https://bugzilla.suse.com/1151927", }, { category: "self", summary: "SUSE Bug 1152631", url: "https://bugzilla.suse.com/1152631", }, { category: "self", summary: "SUSE Bug 1153811", url: "https://bugzilla.suse.com/1153811", }, { category: "self", summary: "SUSE Bug 1153917", url: "https://bugzilla.suse.com/1153917", }, { category: "self", summary: "SUSE Bug 1154043", url: "https://bugzilla.suse.com/1154043", }, { category: "self", summary: "SUSE Bug 1154058", url: "https://bugzilla.suse.com/1154058", }, { category: "self", summary: "SUSE Bug 1154355", url: "https://bugzilla.suse.com/1154355", }, { category: "self", summary: "SUSE Bug 1155331", url: "https://bugzilla.suse.com/1155331", }, { category: "self", summary: "SUSE Bug 1155334", url: "https://bugzilla.suse.com/1155334", }, { category: "self", summary: "SUSE Bug 1155689", url: "https://bugzilla.suse.com/1155689", }, { category: "self", summary: "SUSE Bug 1155897", url: "https://bugzilla.suse.com/1155897", }, { category: "self", summary: "SUSE Bug 1155921", url: "https://bugzilla.suse.com/1155921", }, { category: "self", summary: "SUSE Bug 1156258", url: "https://bugzilla.suse.com/1156258", }, { category: "self", summary: "SUSE Bug 1156259", url: "https://bugzilla.suse.com/1156259", }, { category: "self", summary: "SUSE Bug 1156286", url: "https://bugzilla.suse.com/1156286", }, { category: "self", summary: "SUSE Bug 1156462", url: "https://bugzilla.suse.com/1156462", }, { category: "self", summary: "SUSE Bug 1156471", url: "https://bugzilla.suse.com/1156471", }, { category: "self", summary: "SUSE Bug 1157038", url: "https://bugzilla.suse.com/1157038", }, { category: "self", summary: "SUSE Bug 1157042", url: "https://bugzilla.suse.com/1157042", }, { category: "self", summary: "SUSE Bug 1157070", url: "https://bugzilla.suse.com/1157070", }, { category: "self", summary: "SUSE Bug 1157143", url: "https://bugzilla.suse.com/1157143", }, { category: "self", summary: "SUSE Bug 1157145", url: "https://bugzilla.suse.com/1157145", }, { category: "self", summary: "SUSE Bug 1157155", url: "https://bugzilla.suse.com/1157155", }, { category: "self", summary: "SUSE Bug 1157157", url: "https://bugzilla.suse.com/1157157", }, { category: "self", summary: "SUSE Bug 1157158", url: "https://bugzilla.suse.com/1157158", }, { category: "self", summary: "SUSE Bug 1157162", url: "https://bugzilla.suse.com/1157162", }, { category: "self", summary: "SUSE Bug 1157169", url: "https://bugzilla.suse.com/1157169", }, { category: "self", summary: "SUSE Bug 1157171", url: "https://bugzilla.suse.com/1157171", }, { category: "self", summary: "SUSE Bug 1157173", url: "https://bugzilla.suse.com/1157173", }, { category: "self", summary: "SUSE Bug 1157178", url: "https://bugzilla.suse.com/1157178", }, { category: "self", summary: "SUSE Bug 1157180", url: "https://bugzilla.suse.com/1157180", }, { category: "self", summary: "SUSE Bug 1157182", url: "https://bugzilla.suse.com/1157182", }, { category: "self", summary: "SUSE Bug 1157183", url: "https://bugzilla.suse.com/1157183", }, { category: "self", summary: "SUSE Bug 1157184", url: "https://bugzilla.suse.com/1157184", }, { category: "self", summary: "SUSE Bug 1157191", url: "https://bugzilla.suse.com/1157191", }, { category: "self", summary: "SUSE Bug 1157193", url: "https://bugzilla.suse.com/1157193", }, { category: "self", summary: "SUSE Bug 1157197", url: "https://bugzilla.suse.com/1157197", }, { category: "self", summary: "SUSE Bug 1157298", url: "https://bugzilla.suse.com/1157298", }, { category: "self", summary: "SUSE Bug 1157303", url: "https://bugzilla.suse.com/1157303", }, { category: "self", summary: "SUSE Bug 1157307", url: "https://bugzilla.suse.com/1157307", }, { category: "self", summary: "SUSE Bug 1157324", url: "https://bugzilla.suse.com/1157324", }, { category: "self", summary: "SUSE Bug 1157333", url: "https://bugzilla.suse.com/1157333", }, { category: "self", summary: "SUSE Bug 1157424", url: "https://bugzilla.suse.com/1157424", }, { category: "self", summary: "SUSE Bug 1157463", url: "https://bugzilla.suse.com/1157463", }, { category: "self", summary: "SUSE Bug 1157499", url: "https://bugzilla.suse.com/1157499", }, { category: "self", summary: "SUSE Bug 1157678", url: "https://bugzilla.suse.com/1157678", }, { category: "self", summary: "SUSE Bug 1157692", url: "https://bugzilla.suse.com/1157692", }, { category: "self", summary: "SUSE Bug 1157698", url: "https://bugzilla.suse.com/1157698", }, { category: "self", summary: "SUSE Bug 1157778", url: "https://bugzilla.suse.com/1157778", }, { category: "self", summary: "SUSE Bug 1157853", url: "https://bugzilla.suse.com/1157853", }, { category: "self", summary: "SUSE Bug 1157908", url: "https://bugzilla.suse.com/1157908", }, { category: "self", summary: "SUSE Bug 1158013", url: "https://bugzilla.suse.com/1158013", }, { category: "self", summary: "SUSE Bug 1158021", url: "https://bugzilla.suse.com/1158021", }, { category: "self", summary: "SUSE Bug 1158026", url: "https://bugzilla.suse.com/1158026", }, { category: "self", summary: "SUSE Bug 1158049", url: "https://bugzilla.suse.com/1158049", }, { category: "self", summary: "SUSE Bug 1158063", url: "https://bugzilla.suse.com/1158063", }, { category: "self", summary: "SUSE Bug 1158064", url: "https://bugzilla.suse.com/1158064", }, { category: "self", summary: "SUSE Bug 1158065", url: "https://bugzilla.suse.com/1158065", }, { category: "self", summary: "SUSE Bug 1158066", url: "https://bugzilla.suse.com/1158066", }, { category: "self", summary: "SUSE Bug 1158067", url: "https://bugzilla.suse.com/1158067", }, { category: "self", summary: "SUSE Bug 1158068", url: "https://bugzilla.suse.com/1158068", }, { category: "self", summary: "SUSE Bug 1158082", url: "https://bugzilla.suse.com/1158082", }, { category: "self", summary: "SUSE Bug 1158094", url: "https://bugzilla.suse.com/1158094", }, { category: "self", summary: "SUSE Bug 1158132", url: "https://bugzilla.suse.com/1158132", }, { category: "self", summary: "SUSE Bug 1158381", url: "https://bugzilla.suse.com/1158381", }, { category: "self", summary: "SUSE Bug 1158394", url: "https://bugzilla.suse.com/1158394", }, { category: "self", summary: "SUSE Bug 1158398", url: "https://bugzilla.suse.com/1158398", }, { category: "self", summary: "SUSE Bug 1158407", url: "https://bugzilla.suse.com/1158407", }, { category: "self", summary: "SUSE Bug 1158410", url: "https://bugzilla.suse.com/1158410", }, { category: "self", summary: "SUSE Bug 1158413", url: "https://bugzilla.suse.com/1158413", }, { category: "self", summary: "SUSE Bug 1158417", url: "https://bugzilla.suse.com/1158417", }, { category: "self", summary: "SUSE Bug 1158427", url: "https://bugzilla.suse.com/1158427", }, { category: "self", summary: "SUSE Bug 1158445", url: "https://bugzilla.suse.com/1158445", }, { category: "self", summary: "SUSE Bug 1158533", url: "https://bugzilla.suse.com/1158533", }, { category: "self", summary: "SUSE Bug 1158637", url: "https://bugzilla.suse.com/1158637", }, { category: "self", summary: "SUSE Bug 1158638", url: "https://bugzilla.suse.com/1158638", }, { category: "self", summary: "SUSE Bug 1158639", url: "https://bugzilla.suse.com/1158639", }, { category: "self", summary: "SUSE Bug 1158640", url: "https://bugzilla.suse.com/1158640", }, { category: "self", summary: "SUSE Bug 1158641", url: "https://bugzilla.suse.com/1158641", }, { category: "self", summary: "SUSE Bug 1158643", url: "https://bugzilla.suse.com/1158643", }, { category: "self", summary: "SUSE Bug 1158644", url: "https://bugzilla.suse.com/1158644", }, { category: "self", summary: "SUSE Bug 1158645", url: "https://bugzilla.suse.com/1158645", }, { category: "self", summary: "SUSE Bug 1158646", url: "https://bugzilla.suse.com/1158646", }, { category: "self", summary: "SUSE Bug 1158647", url: "https://bugzilla.suse.com/1158647", }, { category: "self", summary: "SUSE Bug 1158649", url: "https://bugzilla.suse.com/1158649", }, { category: "self", summary: "SUSE Bug 1158651", url: "https://bugzilla.suse.com/1158651", }, { category: "self", summary: "SUSE Bug 1158652", url: "https://bugzilla.suse.com/1158652", }, { category: "self", summary: "SUSE Bug 1158819", url: "https://bugzilla.suse.com/1158819", }, { category: "self", summary: "SUSE Bug 1158823", url: "https://bugzilla.suse.com/1158823", }, { category: "self", summary: "SUSE Bug 1158824", url: "https://bugzilla.suse.com/1158824", }, { category: "self", summary: "SUSE Bug 1158827", url: "https://bugzilla.suse.com/1158827", }, { category: "self", summary: "SUSE Bug 1158834", url: "https://bugzilla.suse.com/1158834", }, { category: "self", summary: "SUSE Bug 1158893", url: "https://bugzilla.suse.com/1158893", }, { category: "self", summary: "SUSE Bug 1158900", url: "https://bugzilla.suse.com/1158900", }, { category: "self", summary: "SUSE Bug 1158903", url: "https://bugzilla.suse.com/1158903", }, { category: "self", summary: "SUSE Bug 1158904", url: "https://bugzilla.suse.com/1158904", }, { category: "self", summary: "SUSE Bug 1158954", url: "https://bugzilla.suse.com/1158954", }, { category: "self", summary: "SUSE Bug 1159024", url: "https://bugzilla.suse.com/1159024", }, { category: "self", summary: "SUSE Bug 1159028", url: "https://bugzilla.suse.com/1159028", }, { category: "self", summary: "SUSE Bug 1159297", url: "https://bugzilla.suse.com/1159297", }, { category: "self", summary: "SUSE Bug 1159394", url: "https://bugzilla.suse.com/1159394", }, { category: "self", summary: "SUSE Bug 1159483", url: "https://bugzilla.suse.com/1159483", }, { category: "self", summary: "SUSE Bug 1159484", url: "https://bugzilla.suse.com/1159484", }, { category: "self", summary: "SUSE Bug 1159569", url: "https://bugzilla.suse.com/1159569", }, { category: "self", summary: "SUSE Bug 1159588", url: "https://bugzilla.suse.com/1159588", }, { category: "self", summary: "SUSE Bug 1159841", url: "https://bugzilla.suse.com/1159841", }, { category: "self", summary: "SUSE Bug 1159908", url: "https://bugzilla.suse.com/1159908", }, { category: "self", summary: "SUSE Bug 1159909", url: "https://bugzilla.suse.com/1159909", }, { category: "self", summary: "SUSE Bug 1159910", url: "https://bugzilla.suse.com/1159910", }, { category: "self", summary: "SUSE Bug 1159911", url: "https://bugzilla.suse.com/1159911", }, { category: "self", summary: "SUSE Bug 1159955", url: "https://bugzilla.suse.com/1159955", }, { category: "self", summary: "SUSE Bug 1160195", url: "https://bugzilla.suse.com/1160195", }, { category: "self", summary: "SUSE Bug 1160210", url: "https://bugzilla.suse.com/1160210", }, { category: "self", summary: "SUSE Bug 1160211", url: "https://bugzilla.suse.com/1160211", }, { category: "self", summary: "SUSE Bug 1160433", url: "https://bugzilla.suse.com/1160433", }, { category: "self", summary: "SUSE Bug 1160442", url: "https://bugzilla.suse.com/1160442", }, { category: "self", summary: "SUSE Bug 1160476", url: "https://bugzilla.suse.com/1160476", }, { category: "self", summary: "SUSE Bug 1160560", url: "https://bugzilla.suse.com/1160560", }, { category: "self", summary: "SUSE Bug 1160755", url: "https://bugzilla.suse.com/1160755", }, { category: "self", summary: "SUSE Bug 1160756", url: "https://bugzilla.suse.com/1160756", }, { category: "self", summary: "SUSE Bug 1160784", url: "https://bugzilla.suse.com/1160784", }, { category: "self", summary: "SUSE Bug 1160787", url: "https://bugzilla.suse.com/1160787", }, { category: "self", summary: "SUSE Bug 1160802", url: "https://bugzilla.suse.com/1160802", }, { category: "self", summary: "SUSE Bug 1160803", url: "https://bugzilla.suse.com/1160803", }, { category: "self", summary: "SUSE Bug 1160804", url: "https://bugzilla.suse.com/1160804", }, { category: "self", summary: "SUSE Bug 1160917", url: "https://bugzilla.suse.com/1160917", }, { category: "self", summary: "SUSE Bug 1160966", url: "https://bugzilla.suse.com/1160966", }, { category: "self", summary: "SUSE Bug 1161087", url: "https://bugzilla.suse.com/1161087", }, { category: "self", summary: "SUSE Bug 1161514", url: "https://bugzilla.suse.com/1161514", }, { category: "self", summary: "SUSE Bug 1161518", url: "https://bugzilla.suse.com/1161518", }, { category: "self", summary: "SUSE Bug 1161522", url: "https://bugzilla.suse.com/1161522", }, { category: "self", summary: "SUSE Bug 1161523", url: "https://bugzilla.suse.com/1161523", }, { category: "self", summary: "SUSE Bug 1161549", url: "https://bugzilla.suse.com/1161549", }, { category: "self", summary: "SUSE Bug 1161552", url: "https://bugzilla.suse.com/1161552", }, { category: "self", summary: "SUSE Bug 1161674", url: "https://bugzilla.suse.com/1161674", }, { category: "self", summary: "SUSE Bug 1161875", url: "https://bugzilla.suse.com/1161875", }, { category: "self", summary: "SUSE Bug 1161931", url: "https://bugzilla.suse.com/1161931", }, { category: "self", summary: "SUSE Bug 1161933", url: "https://bugzilla.suse.com/1161933", }, { category: "self", summary: "SUSE Bug 1161934", url: "https://bugzilla.suse.com/1161934", }, { category: "self", summary: "SUSE Bug 1161935", url: "https://bugzilla.suse.com/1161935", }, { category: "self", summary: "SUSE Bug 1161936", url: "https://bugzilla.suse.com/1161936", }, { category: "self", summary: "SUSE Bug 1161937", url: "https://bugzilla.suse.com/1161937", }, { category: "self", summary: "SUSE Bug 1162028", url: "https://bugzilla.suse.com/1162028", }, { category: "self", summary: "SUSE Bug 1162067", url: "https://bugzilla.suse.com/1162067", }, { category: "self", summary: "SUSE CVE CVE-2019-14615 page", url: "https://www.suse.com/security/cve/CVE-2019-14615/", }, { category: "self", summary: "SUSE CVE CVE-2019-14895 page", url: "https://www.suse.com/security/cve/CVE-2019-14895/", }, { category: "self", summary: "SUSE CVE CVE-2019-14896 page", url: "https://www.suse.com/security/cve/CVE-2019-14896/", }, { category: "self", summary: "SUSE CVE CVE-2019-14897 page", url: "https://www.suse.com/security/cve/CVE-2019-14897/", }, { category: "self", summary: "SUSE CVE CVE-2019-14901 page", url: "https://www.suse.com/security/cve/CVE-2019-14901/", }, { category: "self", summary: "SUSE CVE CVE-2019-15213 page", url: "https://www.suse.com/security/cve/CVE-2019-15213/", }, { category: "self", summary: "SUSE CVE CVE-2019-16994 page", url: "https://www.suse.com/security/cve/CVE-2019-16994/", }, { category: "self", summary: "SUSE CVE CVE-2019-18660 page", url: "https://www.suse.com/security/cve/CVE-2019-18660/", }, { category: "self", summary: "SUSE CVE CVE-2019-18683 page", url: "https://www.suse.com/security/cve/CVE-2019-18683/", }, { category: "self", summary: "SUSE CVE CVE-2019-18808 page", url: "https://www.suse.com/security/cve/CVE-2019-18808/", }, { category: "self", summary: "SUSE CVE CVE-2019-18809 page", url: "https://www.suse.com/security/cve/CVE-2019-18809/", }, { category: "self", summary: "SUSE CVE CVE-2019-19036 page", url: "https://www.suse.com/security/cve/CVE-2019-19036/", }, { category: "self", summary: "SUSE CVE CVE-2019-19045 page", url: "https://www.suse.com/security/cve/CVE-2019-19045/", }, { category: "self", summary: "SUSE CVE CVE-2019-19049 page", url: "https://www.suse.com/security/cve/CVE-2019-19049/", }, { category: "self", summary: "SUSE CVE CVE-2019-19051 page", url: "https://www.suse.com/security/cve/CVE-2019-19051/", }, { category: "self", summary: "SUSE CVE CVE-2019-19052 page", url: "https://www.suse.com/security/cve/CVE-2019-19052/", }, { category: "self", summary: "SUSE CVE CVE-2019-19054 page", url: "https://www.suse.com/security/cve/CVE-2019-19054/", }, { category: "self", summary: "SUSE CVE CVE-2019-19056 page", url: "https://www.suse.com/security/cve/CVE-2019-19056/", }, { category: "self", summary: "SUSE CVE CVE-2019-19057 page", url: "https://www.suse.com/security/cve/CVE-2019-19057/", }, { category: "self", summary: "SUSE CVE CVE-2019-19058 page", url: "https://www.suse.com/security/cve/CVE-2019-19058/", }, { category: "self", summary: "SUSE CVE CVE-2019-19060 page", url: "https://www.suse.com/security/cve/CVE-2019-19060/", }, { category: "self", summary: "SUSE CVE CVE-2019-19062 page", url: "https://www.suse.com/security/cve/CVE-2019-19062/", }, { category: "self", summary: "SUSE CVE CVE-2019-19063 page", url: "https://www.suse.com/security/cve/CVE-2019-19063/", }, { category: "self", summary: "SUSE CVE CVE-2019-19065 page", url: "https://www.suse.com/security/cve/CVE-2019-19065/", }, { category: "self", summary: "SUSE CVE CVE-2019-19066 page", url: "https://www.suse.com/security/cve/CVE-2019-19066/", }, { category: "self", summary: "SUSE CVE CVE-2019-19067 page", url: "https://www.suse.com/security/cve/CVE-2019-19067/", }, { category: "self", summary: "SUSE CVE CVE-2019-19068 page", url: "https://www.suse.com/security/cve/CVE-2019-19068/", }, { category: "self", summary: "SUSE CVE CVE-2019-19073 page", url: "https://www.suse.com/security/cve/CVE-2019-19073/", }, { category: "self", summary: "SUSE CVE CVE-2019-19074 page", url: "https://www.suse.com/security/cve/CVE-2019-19074/", }, { category: "self", summary: "SUSE CVE CVE-2019-19075 page", url: "https://www.suse.com/security/cve/CVE-2019-19075/", }, { category: "self", summary: "SUSE CVE CVE-2019-19077 page", url: "https://www.suse.com/security/cve/CVE-2019-19077/", }, { category: "self", summary: "SUSE CVE CVE-2019-19227 page", url: "https://www.suse.com/security/cve/CVE-2019-19227/", }, { category: "self", summary: "SUSE CVE CVE-2019-19318 page", url: "https://www.suse.com/security/cve/CVE-2019-19318/", }, { category: "self", summary: "SUSE CVE CVE-2019-19319 page", url: "https://www.suse.com/security/cve/CVE-2019-19319/", }, { category: "self", summary: "SUSE CVE CVE-2019-19332 page", url: "https://www.suse.com/security/cve/CVE-2019-19332/", }, { category: "self", summary: "SUSE CVE CVE-2019-19338 page", url: "https://www.suse.com/security/cve/CVE-2019-19338/", }, { category: "self", summary: "SUSE CVE CVE-2019-19447 page", url: "https://www.suse.com/security/cve/CVE-2019-19447/", }, { category: "self", summary: "SUSE CVE CVE-2019-19523 page", url: "https://www.suse.com/security/cve/CVE-2019-19523/", }, { category: "self", summary: "SUSE CVE CVE-2019-19524 page", url: "https://www.suse.com/security/cve/CVE-2019-19524/", }, { category: "self", summary: "SUSE CVE CVE-2019-19525 page", url: "https://www.suse.com/security/cve/CVE-2019-19525/", }, { category: "self", summary: "SUSE CVE CVE-2019-19526 page", url: "https://www.suse.com/security/cve/CVE-2019-19526/", }, { category: "self", summary: "SUSE CVE CVE-2019-19527 page", url: "https://www.suse.com/security/cve/CVE-2019-19527/", }, { category: "self", summary: "SUSE CVE CVE-2019-19528 page", url: "https://www.suse.com/security/cve/CVE-2019-19528/", }, { category: "self", summary: "SUSE CVE CVE-2019-19529 page", url: "https://www.suse.com/security/cve/CVE-2019-19529/", }, { category: "self", summary: "SUSE CVE CVE-2019-19530 page", url: "https://www.suse.com/security/cve/CVE-2019-19530/", }, { category: "self", summary: "SUSE CVE CVE-2019-19531 page", url: "https://www.suse.com/security/cve/CVE-2019-19531/", }, { category: "self", summary: "SUSE CVE CVE-2019-19532 page", url: "https://www.suse.com/security/cve/CVE-2019-19532/", }, { category: "self", summary: "SUSE CVE CVE-2019-19533 page", url: "https://www.suse.com/security/cve/CVE-2019-19533/", }, { category: "self", summary: "SUSE CVE CVE-2019-19534 page", url: "https://www.suse.com/security/cve/CVE-2019-19534/", }, { category: "self", summary: "SUSE CVE CVE-2019-19535 page", url: "https://www.suse.com/security/cve/CVE-2019-19535/", }, { category: "self", summary: "SUSE CVE CVE-2019-19536 page", url: "https://www.suse.com/security/cve/CVE-2019-19536/", }, { category: "self", summary: "SUSE CVE CVE-2019-19537 page", url: "https://www.suse.com/security/cve/CVE-2019-19537/", }, { category: "self", summary: "SUSE CVE CVE-2019-19543 page", url: "https://www.suse.com/security/cve/CVE-2019-19543/", }, { category: "self", summary: "SUSE CVE CVE-2019-19767 page", url: "https://www.suse.com/security/cve/CVE-2019-19767/", }, { category: "self", summary: "SUSE CVE CVE-2019-19965 page", url: "https://www.suse.com/security/cve/CVE-2019-19965/", }, { category: "self", summary: "SUSE CVE CVE-2019-19966 page", url: "https://www.suse.com/security/cve/CVE-2019-19966/", }, { category: "self", summary: "SUSE CVE CVE-2019-20054 page", url: "https://www.suse.com/security/cve/CVE-2019-20054/", }, { category: "self", summary: "SUSE CVE CVE-2019-20095 page", url: "https://www.suse.com/security/cve/CVE-2019-20095/", }, { category: "self", summary: "SUSE CVE CVE-2019-20096 page", url: "https://www.suse.com/security/cve/CVE-2019-20096/", }, { category: "self", summary: "SUSE CVE CVE-2020-7053 page", url: "https://www.suse.com/security/cve/CVE-2020-7053/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2020-03-05T15:16:11Z", generator: { date: "2020-03-05T15:16:11Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2020:0599-1", initial_release_date: "2020-03-05T15:16:11Z", revision_history: [ { date: "2020-03-05T15:16:11Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-4.12.14-8.12.1.noarch", product: { name: "kernel-devel-rt-4.12.14-8.12.1.noarch", product_id: "kernel-devel-rt-4.12.14-8.12.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-4.12.14-8.12.1.noarch", product: { name: "kernel-source-rt-4.12.14-8.12.1.noarch", product_id: "kernel-source-rt-4.12.14-8.12.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", product: { name: "cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", product_id: "cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-4.12.14-8.12.1.x86_64", product: { name: "dlm-kmp-rt-4.12.14-8.12.1.x86_64", product_id: "dlm-kmp-rt-4.12.14-8.12.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-4.12.14-8.12.1.x86_64", product: { name: "gfs2-kmp-rt-4.12.14-8.12.1.x86_64", product_id: "gfs2-kmp-rt-4.12.14-8.12.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-4.12.14-8.12.1.x86_64", product: { name: "kernel-rt-4.12.14-8.12.1.x86_64", product_id: "kernel-rt-4.12.14-8.12.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-base-4.12.14-8.12.1.x86_64", product: { name: "kernel-rt-base-4.12.14-8.12.1.x86_64", product_id: "kernel-rt-base-4.12.14-8.12.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-4.12.14-8.12.1.x86_64", product: { name: "kernel-rt-devel-4.12.14-8.12.1.x86_64", product_id: "kernel-rt-devel-4.12.14-8.12.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", product: { name: "kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", product_id: "kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-4.12.14-8.12.1.x86_64", product: { name: "kernel-syms-rt-4.12.14-8.12.1.x86_64", product_id: "kernel-syms-rt-4.12.14-8.12.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", product: { name: "ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", product_id: "ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Real Time 12 SP4", product: { name: "SUSE Linux Enterprise Real Time 12 SP4", product_id: "SUSE Linux Enterprise Real Time 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:suse-linux-enterprise-rt:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", product_id: "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", }, product_reference: "cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", product_id: "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", }, product_reference: "dlm-kmp-rt-4.12.14-8.12.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", product_id: "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", }, product_reference: "gfs2-kmp-rt-4.12.14-8.12.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-4.12.14-8.12.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4", product_id: "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", }, product_reference: "kernel-devel-rt-4.12.14-8.12.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", product_id: "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", }, product_reference: "kernel-rt-4.12.14-8.12.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-base-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", product_id: "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", }, product_reference: "kernel-rt-base-4.12.14-8.12.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", product_id: "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", }, product_reference: "kernel-rt-devel-4.12.14-8.12.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", product_id: "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", }, product_reference: "kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-4.12.14-8.12.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4", product_id: "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", }, product_reference: "kernel-source-rt-4.12.14-8.12.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", product_id: "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", }, product_reference: "kernel-syms-rt-4.12.14-8.12.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", product_id: "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", }, product_reference: "ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2019-14615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14615", }, ], notes: [ { category: "general", text: "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14615", url: "https://www.suse.com/security/cve/CVE-2019-14615", }, { category: "external", summary: "SUSE Bug 1160195 for CVE-2019-14615", url: "https://bugzilla.suse.com/1160195", }, { category: "external", summary: "SUSE Bug 1165881 for CVE-2019-14615", url: "https://bugzilla.suse.com/1165881", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-14615", }, { cve: "CVE-2019-14895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14895", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14895", url: "https://www.suse.com/security/cve/CVE-2019-14895", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1157158 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157158", }, { category: "external", summary: "SUSE Bug 1173100 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173100", }, { category: "external", summary: "SUSE Bug 1173660 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "important", }, ], title: "CVE-2019-14895", }, { cve: "CVE-2019-14896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14896", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14896", url: "https://www.suse.com/security/cve/CVE-2019-14896", }, { category: "external", summary: "SUSE Bug 1157157 for CVE-2019-14896", url: "https://bugzilla.suse.com/1157157", }, { category: "external", summary: "SUSE Bug 1160468 for CVE-2019-14896", url: "https://bugzilla.suse.com/1160468", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "important", }, ], title: "CVE-2019-14896", }, { cve: "CVE-2019-14897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14897", }, ], notes: [ { category: "general", text: "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14897", url: "https://www.suse.com/security/cve/CVE-2019-14897", }, { category: "external", summary: "SUSE Bug 1157155 for CVE-2019-14897", url: "https://bugzilla.suse.com/1157155", }, { category: "external", summary: "SUSE Bug 1160467 for CVE-2019-14897", url: "https://bugzilla.suse.com/1160467", }, { category: "external", summary: "SUSE Bug 1160468 for CVE-2019-14897", url: "https://bugzilla.suse.com/1160468", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "important", }, ], title: "CVE-2019-14897", }, { cve: "CVE-2019-14901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14901", }, ], notes: [ { category: "general", text: "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14901", url: "https://www.suse.com/security/cve/CVE-2019-14901", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14901", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1173661 for CVE-2019-14901", url: "https://bugzilla.suse.com/1173661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "important", }, ], title: "CVE-2019-14901", }, { cve: "CVE-2019-15213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15213", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15213", url: "https://www.suse.com/security/cve/CVE-2019-15213", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146544 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146544", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-15213", }, { cve: "CVE-2019-16994", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16994", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn->fb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16994", url: "https://www.suse.com/security/cve/CVE-2019-16994", }, { category: "external", summary: "SUSE Bug 1161523 for CVE-2019-16994", url: "https://bugzilla.suse.com/1161523", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-16994", }, { cve: "CVE-2019-18660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18660", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18660", url: "https://www.suse.com/security/cve/CVE-2019-18660", }, { category: "external", summary: "SUSE Bug 1157038 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157038", }, { category: "external", summary: "SUSE Bug 1157923 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-18660", }, { cve: "CVE-2019-18683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18683", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18683", url: "https://www.suse.com/security/cve/CVE-2019-18683", }, { category: "external", summary: "SUSE Bug 1155897 for CVE-2019-18683", url: "https://bugzilla.suse.com/1155897", }, { category: "external", summary: "SUSE Bug 1173868 for CVE-2019-18683", url: "https://bugzilla.suse.com/1173868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-18683", }, { cve: "CVE-2019-18808", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18808", }, ], notes: [ { category: "general", text: "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18808", url: "https://www.suse.com/security/cve/CVE-2019-18808", }, { category: "external", summary: "SUSE Bug 1156259 for CVE-2019-18808", url: "https://bugzilla.suse.com/1156259", }, { category: "external", summary: "SUSE Bug 1189884 for CVE-2019-18808", url: "https://bugzilla.suse.com/1189884", }, { category: "external", summary: "SUSE Bug 1190534 for CVE-2019-18808", url: "https://bugzilla.suse.com/1190534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-18808", }, { cve: "CVE-2019-18809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18809", }, ], notes: [ { category: "general", text: "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18809", url: "https://www.suse.com/security/cve/CVE-2019-18809", }, { category: "external", summary: "SUSE Bug 1156258 for CVE-2019-18809", url: "https://bugzilla.suse.com/1156258", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-18809", }, { cve: "CVE-2019-19036", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19036", }, ], notes: [ { category: "general", text: "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19036", url: "https://www.suse.com/security/cve/CVE-2019-19036", }, { category: "external", summary: "SUSE Bug 1157692 for CVE-2019-19036", url: "https://bugzilla.suse.com/1157692", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19036", }, { cve: "CVE-2019-19045", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19045", }, ], notes: [ { category: "general", text: "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19045", url: "https://www.suse.com/security/cve/CVE-2019-19045", }, { category: "external", summary: "SUSE Bug 1161522 for CVE-2019-19045", url: "https://bugzilla.suse.com/1161522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19045", }, { cve: "CVE-2019-19049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19049", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19049", url: "https://www.suse.com/security/cve/CVE-2019-19049", }, { category: "external", summary: "SUSE Bug 1157173 for CVE-2019-19049", url: "https://bugzilla.suse.com/1157173", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19049", }, { cve: "CVE-2019-19051", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19051", }, ], notes: [ { category: "general", text: "A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19051", url: "https://www.suse.com/security/cve/CVE-2019-19051", }, { category: "external", summary: "SUSE Bug 1159024 for CVE-2019-19051", url: "https://bugzilla.suse.com/1159024", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19051", }, { cve: "CVE-2019-19052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19052", }, ], notes: [ { category: "general", text: "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19052", url: "https://www.suse.com/security/cve/CVE-2019-19052", }, { category: "external", summary: "SUSE Bug 1157324 for CVE-2019-19052", url: "https://bugzilla.suse.com/1157324", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19052", }, { cve: "CVE-2019-19054", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19054", }, ], notes: [ { category: "general", text: "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19054", url: "https://www.suse.com/security/cve/CVE-2019-19054", }, { category: "external", summary: "SUSE Bug 1161518 for CVE-2019-19054", url: "https://bugzilla.suse.com/1161518", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19054", }, { cve: "CVE-2019-19056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19056", }, ], notes: [ { category: "general", text: "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19056", url: "https://www.suse.com/security/cve/CVE-2019-19056", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19056", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19057", }, ], notes: [ { category: "general", text: "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19057", url: "https://www.suse.com/security/cve/CVE-2019-19057", }, { category: "external", summary: "SUSE Bug 1157193 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157193", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "low", }, ], title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19058", }, ], notes: [ { category: "general", text: "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19058", url: "https://www.suse.com/security/cve/CVE-2019-19058", }, { category: "external", summary: "SUSE Bug 1157145 for CVE-2019-19058", url: "https://bugzilla.suse.com/1157145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19058", }, { cve: "CVE-2019-19060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19060", }, ], notes: [ { category: "general", text: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19060", url: "https://www.suse.com/security/cve/CVE-2019-19060", }, { category: "external", summary: "SUSE Bug 1157178 for CVE-2019-19060", url: "https://bugzilla.suse.com/1157178", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19060", }, { cve: "CVE-2019-19062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19062", }, ], notes: [ { category: "general", text: "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19062", url: "https://www.suse.com/security/cve/CVE-2019-19062", }, { category: "external", summary: "SUSE Bug 1157333 for CVE-2019-19062", url: "https://bugzilla.suse.com/1157333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19063", }, ], notes: [ { category: "general", text: "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19063", url: "https://www.suse.com/security/cve/CVE-2019-19063", }, { category: "external", summary: "SUSE Bug 1157298 for CVE-2019-19063", url: "https://bugzilla.suse.com/1157298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19063", }, { cve: "CVE-2019-19065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19065", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19065", url: "https://www.suse.com/security/cve/CVE-2019-19065", }, { category: "external", summary: "SUSE Bug 1157191 for CVE-2019-19065", url: "https://bugzilla.suse.com/1157191", }, { category: "external", summary: "SUSE Bug 1173961 for CVE-2019-19065", url: "https://bugzilla.suse.com/1173961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "important", }, ], title: "CVE-2019-19065", }, { cve: "CVE-2019-19066", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19066", }, ], notes: [ { category: "general", text: "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19066", url: "https://www.suse.com/security/cve/CVE-2019-19066", }, { category: "external", summary: "SUSE Bug 1157303 for CVE-2019-19066", url: "https://bugzilla.suse.com/1157303", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19066", }, { cve: "CVE-2019-19067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19067", }, ], notes: [ { category: "general", text: "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19067", url: "https://www.suse.com/security/cve/CVE-2019-19067", }, { category: "external", summary: "SUSE Bug 1157180 for CVE-2019-19067", url: "https://bugzilla.suse.com/1157180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19068", }, ], notes: [ { category: "general", text: "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19068", url: "https://www.suse.com/security/cve/CVE-2019-19068", }, { category: "external", summary: "SUSE Bug 1157307 for CVE-2019-19068", url: "https://bugzilla.suse.com/1157307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19068", }, { cve: "CVE-2019-19073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19073", }, ], notes: [ { category: "general", text: "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19073", url: "https://www.suse.com/security/cve/CVE-2019-19073", }, { category: "external", summary: "SUSE Bug 1157070 for CVE-2019-19073", url: "https://bugzilla.suse.com/1157070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19074", }, ], notes: [ { category: "general", text: "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19074", url: "https://www.suse.com/security/cve/CVE-2019-19074", }, { category: "external", summary: "SUSE Bug 1157143 for CVE-2019-19074", url: "https://bugzilla.suse.com/1157143", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19075", }, ], notes: [ { category: "general", text: "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19075", url: "https://www.suse.com/security/cve/CVE-2019-19075", }, { category: "external", summary: "SUSE Bug 1157162 for CVE-2019-19075", url: "https://bugzilla.suse.com/1157162", }, { category: "external", summary: "SUSE Bug 1173958 for CVE-2019-19075", url: "https://bugzilla.suse.com/1173958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "low", }, ], title: "CVE-2019-19075", }, { cve: "CVE-2019-19077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19077", }, ], notes: [ { category: "general", text: "A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19077", url: "https://www.suse.com/security/cve/CVE-2019-19077", }, { category: "external", summary: "SUSE Bug 1157171 for CVE-2019-19077", url: "https://bugzilla.suse.com/1157171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19077", }, { cve: "CVE-2019-19227", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19227", }, ], notes: [ { category: "general", text: "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19227", url: "https://www.suse.com/security/cve/CVE-2019-19227", }, { category: "external", summary: "SUSE Bug 1157678 for CVE-2019-19227", url: "https://bugzilla.suse.com/1157678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19227", }, { cve: "CVE-2019-19318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19318", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19318", url: "https://www.suse.com/security/cve/CVE-2019-19318", }, { category: "external", summary: "SUSE Bug 1158026 for CVE-2019-19318", url: "https://bugzilla.suse.com/1158026", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19318", }, { cve: "CVE-2019-19319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19319", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19319", url: "https://www.suse.com/security/cve/CVE-2019-19319", }, { category: "external", summary: "SUSE Bug 1158021 for CVE-2019-19319", url: "https://bugzilla.suse.com/1158021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19319", }, { cve: "CVE-2019-19332", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19332", }, ], notes: [ { category: "general", text: "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19332", url: "https://www.suse.com/security/cve/CVE-2019-19332", }, { category: "external", summary: "SUSE Bug 1158827 for CVE-2019-19332", url: "https://bugzilla.suse.com/1158827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19332", }, { cve: "CVE-2019-19338", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19338", }, ], notes: [ { category: "general", text: "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19338", url: "https://www.suse.com/security/cve/CVE-2019-19338", }, { category: "external", summary: "SUSE Bug 1158954 for CVE-2019-19338", url: "https://bugzilla.suse.com/1158954", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19338", }, { cve: "CVE-2019-19447", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19447", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19447", url: "https://www.suse.com/security/cve/CVE-2019-19447", }, { category: "external", summary: "SUSE Bug 1158819 for CVE-2019-19447", url: "https://bugzilla.suse.com/1158819", }, { category: "external", summary: "SUSE Bug 1173869 for CVE-2019-19447", url: "https://bugzilla.suse.com/1173869", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "important", }, ], title: "CVE-2019-19447", }, { cve: "CVE-2019-19523", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19523", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19523", url: "https://www.suse.com/security/cve/CVE-2019-19523", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158823 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158823", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19523", }, { cve: "CVE-2019-19524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19524", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19524", url: "https://www.suse.com/security/cve/CVE-2019-19524", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158413 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158413", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "low", }, ], title: "CVE-2019-19524", }, { cve: "CVE-2019-19525", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19525", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19525", url: "https://www.suse.com/security/cve/CVE-2019-19525", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158417 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158417", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19525", }, { cve: "CVE-2019-19526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19526", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19526", url: "https://www.suse.com/security/cve/CVE-2019-19526", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158893 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19526", }, { cve: "CVE-2019-19527", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19527", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19527", url: "https://www.suse.com/security/cve/CVE-2019-19527", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158900 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158900", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19527", }, { cve: "CVE-2019-19528", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19528", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19528", url: "https://www.suse.com/security/cve/CVE-2019-19528", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158407 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158407", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19528", }, { cve: "CVE-2019-19529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19529", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19529", url: "https://www.suse.com/security/cve/CVE-2019-19529", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19529", }, { cve: "CVE-2019-19530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19530", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19530", url: "https://www.suse.com/security/cve/CVE-2019-19530", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158410 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158410", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19530", }, { cve: "CVE-2019-19531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19531", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19531", url: "https://www.suse.com/security/cve/CVE-2019-19531", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158427", }, { category: "external", summary: "SUSE Bug 1158445 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158445", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "low", }, ], title: "CVE-2019-19531", }, { cve: "CVE-2019-19532", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19532", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19532", url: "https://www.suse.com/security/cve/CVE-2019-19532", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158823 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158823", }, { category: "external", summary: "SUSE Bug 1158824 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158824", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19532", }, { cve: "CVE-2019-19533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19533", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19533", url: "https://www.suse.com/security/cve/CVE-2019-19533", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19533", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19533", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "low", }, ], title: "CVE-2019-19533", }, { cve: "CVE-2019-19534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19534", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19534", url: "https://www.suse.com/security/cve/CVE-2019-19534", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158398 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158398", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "low", }, ], title: "CVE-2019-19534", }, { cve: "CVE-2019-19535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19535", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19535", url: "https://www.suse.com/security/cve/CVE-2019-19535", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158903 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19535", }, { cve: "CVE-2019-19536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19536", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19536", url: "https://www.suse.com/security/cve/CVE-2019-19536", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158394 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158394", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "low", }, ], title: "CVE-2019-19536", }, { cve: "CVE-2019-19537", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19537", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19537", url: "https://www.suse.com/security/cve/CVE-2019-19537", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158904 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19537", }, { cve: "CVE-2019-19543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19543", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19543", url: "https://www.suse.com/security/cve/CVE-2019-19543", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19543", url: "https://bugzilla.suse.com/1158427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "low", }, ], title: "CVE-2019-19543", }, { cve: "CVE-2019-19767", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19767", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19767", url: "https://www.suse.com/security/cve/CVE-2019-19767", }, { category: "external", summary: "SUSE Bug 1159297 for CVE-2019-19767", url: "https://bugzilla.suse.com/1159297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19767", }, { cve: "CVE-2019-19965", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19965", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19965", url: "https://www.suse.com/security/cve/CVE-2019-19965", }, { category: "external", summary: "SUSE Bug 1159911 for CVE-2019-19965", url: "https://bugzilla.suse.com/1159911", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-19965", }, { cve: "CVE-2019-19966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19966", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19966", url: "https://www.suse.com/security/cve/CVE-2019-19966", }, { category: "external", summary: "SUSE Bug 1159841 for CVE-2019-19966", url: "https://bugzilla.suse.com/1159841", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "low", }, ], title: "CVE-2019-19966", }, { cve: "CVE-2019-20054", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20054", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20054", url: "https://www.suse.com/security/cve/CVE-2019-20054", }, { category: "external", summary: "SUSE Bug 1159910 for CVE-2019-20054", url: "https://bugzilla.suse.com/1159910", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-20054", }, { cve: "CVE-2019-20095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20095", }, ], notes: [ { category: "general", text: "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20095", url: "https://www.suse.com/security/cve/CVE-2019-20095", }, { category: "external", summary: "SUSE Bug 1159909 for CVE-2019-20095", url: "https://bugzilla.suse.com/1159909", }, { category: "external", summary: "SUSE Bug 1159914 for CVE-2019-20095", url: "https://bugzilla.suse.com/1159914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "important", }, ], title: "CVE-2019-20095", }, { cve: "CVE-2019-20096", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20096", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20096", url: "https://www.suse.com/security/cve/CVE-2019-20096", }, { category: "external", summary: "SUSE Bug 1159908 for CVE-2019-20096", url: "https://bugzilla.suse.com/1159908", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2019-20096", }, { cve: "CVE-2020-7053", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-7053", }, ], notes: [ { category: "general", text: "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-7053", url: "https://www.suse.com/security/cve/CVE-2020-7053", }, { category: "external", summary: "SUSE Bug 1160966 for CVE-2020-7053", url: "https://bugzilla.suse.com/1160966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-05T15:16:11Z", details: "moderate", }, ], title: "CVE-2020-7053", }, ], }
suse-su-2019:3381-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-19767: Fixed ext4_expand_extra_isize mishandles, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).\n- CVE-2019-18808: Fixed a memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption) (bnc#1156259).\n- CVE-2019-19066: Fixed memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c that allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures (bnc#1157303).\n- CVE-2019-19051: Fixed memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c that allowed attackers to cause a denial of service (memory consumption) (bnc#1159024).\n- CVE-2019-19338: There was an incomplete fix for Transaction Asynchronous Abort (TAA) (bsc#1158954).\n- CVE-2019-19332: There was an OOB memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).\n- CVE-2019-19537: There was a race condition bug that could have been caused by a malicious USB device in the USB character device driver layer (bnc#1158904).\n- CVE-2019-19535: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bnc#1158903).\n- CVE-2019-19527: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bnc#1158900).\n- CVE-2019-19526: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver (bnc#1158893).\n- CVE-2019-19533: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bnc#1158834).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that could have been caused by a malicious USB device in the Linux kernel HID drivers (bnc#1158824).\n- CVE-2019-19523: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bnc#1158823).\n- CVE-2019-15213: An issue was discovered in the Linux kernel, there was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).\n- CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).\n- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).\n- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).\n- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).\n- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).\n- CVE-2019-19528: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (bnc#1158407).\n- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).\n- CVE-2019-19529: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver (bnc#1158381).\n- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).\n- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).\n- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).\n- CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1156258).\n- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).\n- CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157307).\n- CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157298).\n- CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel there was a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client (bnc#1157678).\n- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).\n- CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering copy to udata failures (bnc#1157171).\n- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).\n- CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures (bsc#1157180).\n- CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157178).\n- CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures (bsc#1157173).\n- CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures (bnc#1157162).\n- CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures (bnc#1157145).\n- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).\n- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function (bnc#1157070).\n- CVE-2019-15916: An issue was discovered in the Linux kernel There was a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service (bnc#1149448).\n- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).\n- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).\n- CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket (bnc#1152782).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).\n- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n- ACPI: OSL: only free map once in osl.c (bsc#1051510).\n- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).\n- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n- ALSA: 6fire: Drop the dead code (git-fixes).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).\n- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).\n- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).\n- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).\n- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).\n- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).\n- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n- Bluetooth: delete a stray unlock (bsc#1051510).\n- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).\n- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n- Btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n- CIFS: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n- CIFS: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n- CIFS: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n- CIFS: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n- CIFS: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n- CIFS: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n- CIFS: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n- CIFS: fix max ea value size (bsc#1144333, bsc#1154355).\n- Cover up kABI breakage due to DH key verification (bsc#1155331).\n- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n- HID: Fix assumption that devices have inputs (git-fixes).\n- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).\n- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).\n- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).\n- KVM: x86: Remove a spurious export of a static function (bsc#1158954).\n- NFC: fdp: fix incorrect free object (networking-stable-19_11_10).\n- NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- NFC: st21nfca: fix double free (networking-stable-19_11_10).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).\n- PCI/PME: Fix possible use-after-free on remove (git-fixes).\n- PCI/PTM: Remove spurious 'd' from granularity message (bsc#1051510).\n- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n- PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30 (git-fixes).\n- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).\n- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).\n- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n- PM / devfreq: passive: fix compiler warning (bsc#1051510).\n- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n- RDMA/hns: Prevent memory leaks of eq->buf_list (bsc#1104427 ).\n- UAS: Revert commit 3ae62a42090f ('UAS: fix alignment of scatter/gather segments').\n- USB: adutux: fix interface sanity check (bsc#1051510).\n- USB: chaoskey: fix error case of a timeout (git-fixes).\n- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- USB: idmouse: fix interface sanity checks (bsc#1051510).\n- USB: ldusb: fix control-message timeout (bsc#1051510).\n- USB: ldusb: fix ring-buffer locking (bsc#1051510).\n- USB: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n- USB: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).\n- USB: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n- USB: serial: mos7720: fix remote wakeup (git-fixes).\n- USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n- USB: serial: mos7840: fix remote wakeup (git-fixes).\n- USB: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n- USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- USBIP: add config dependency for SGL_ALLOC (git-fixes).\n- apparmor: fix unsigned len comparison with less than zero (git-fixes).\n- appledisplay: fix error handling in the scheduled work (git-fixes).\n- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n- ata: ep93xx: Use proper enums for directions (bsc#1051510).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: fix vdev-start timeout on error (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n- ath6kl: Fix off by one error in scan completion (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- ath9k_hw: fix uninitialized variable data (bsc#1051510).\n- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).\n- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).\n- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).\n- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).\n- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n- brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).\n- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: peak_usb: report bus recovery as well (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n- cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).\n- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n- cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- configfs_register_group() shouldn't be (and isn't) called in rmdirable parts (bsc#1051510).\n- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).\n- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n- cpupower: Fix coredump on VMWare (bsc#1051510).\n- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n- crypto: dh - add public key verification test (bsc#1155331).\n- crypto: dh - fix calculating encoded key size (bsc#1155331).\n- crypto: dh - fix memory leak (bsc#1155331).\n- crypto: dh - update test for public key verification (bsc#1155331).\n- crypto: ecdh - add public key verification test (bsc#1155331).\n- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).\n- crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n- dlm: do not leak kernel pointer to userspace (bsc#1051510).\n- dlm: fix invalid free (bsc#1051510).\n- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n- docs: move protection-keys.rst to the core-api book (bsc#1078248).\n- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).\n- drivers/regulator: fix a missing check of return value (bsc#1051510).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)\n- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)\n- e1000e: Add support for Comet Lake (bsc#1158533).\n- e1000e: Add support for Tiger Lake (bsc#1158533).\n- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n- e1000e: Increase pause and refresh time (bsc#1158533).\n- e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n- ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable (bsc#1158646).\n- ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either (bsc#1158647).\n- ext4: fix punch hole for inline_data file systems (bsc#1158640).\n- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n- sctp: Fix regression (bsc#1158082).\n- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).\n- hypfs: Fix error number left in struct pointer member (bsc#1051510).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n- intel_th: Fix a double put_device() in error path (git-fixes).\n- iomap: Fix pipe page leakage during splicing (bsc#1158651).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).\n- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: check kasprintf() return value (bsc#1051510).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n- kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).\n- kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n- kexec: bail out upon SIGKILL when allocating memory (git-fixes).\n- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n- livepatch: Basic API to track system state changes (bsc#1071995 ).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n- loop: add ioctl for changing logical block size (bsc#1108043).\n- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n- mac80211: fix station inactive_time shortly after boot (bsc#1051510).\n- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n- macvlan: schedule bc_work even if error (bsc#1051510).\n- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).\n- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: bdisp: fix memleak on release (git-fixes).\n- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n- media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n- media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n- media: ov6650: Fix control handler not freed on init error (git-fixes).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).\n- media: radio: wl1273: fix interrupt masking on release (git-fixes).\n- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n- media: uvcvideo: Fix error path in control parsing failure (git-fixes).\n- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).\n- media: vim2m: Fix abort issue (git-fixes).\n- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n- mei: bus: prefix device names on bus with the bus name (bsc#1051510).\n- mei: fix modalias documentation (git-fixes).\n- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).\n- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).\n- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n- mmc: core: fix wl1251 sdio quirks (git-fixes).\n- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdio: fix wl1251 vendor id (git-fixes).\n- moduleparam: fix parameter description mismatch (bsc#1051510).\n- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n- mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).\n- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).\n- nbd: prevent memory leak (bsc#1158638).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).\n- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n- net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).\n- net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).\n- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n- net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).\n- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n- net: dsa: fix switch tree list (networking-stable-19_11_05).\n- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).\n- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n- net: phy: Check against net_device being NULL (bsc#1051510).\n- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).\n- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).\n- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).\n- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: marvell: clear wol event before setting it (bsc#1051510).\n- net: phy: meson-gxl: check phy_write return value (bsc#1051510).\n- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: mscc: read 'vsc8531, edge-slowdown' as an u32 (bsc#1051510).\n- net: phy: mscc: read 'vsc8531,vddmac' as an u32 (bsc#1051510).\n- net: phy: xgene: disable clk on error paths (bsc#1051510).\n- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).\n- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).\n- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).\n- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).\n- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n- nfc: netlink: fix double device reference drop (git-fixes).\n- nfc: port100: handle command failure cleanly (git-fixes).\n- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n- ocfs2: fix passing zero to 'PTR_ERR' warning (bsc#1158649).\n- openvswitch: fix flow command message size (git-fixes).\n- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).\n- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n- powerpc/bpf: Fix tail call implementation (bsc#1157698).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n- printk: Export console_printk (bsc#1071995).\n- pwm: Clear chip_data in pwm_put() (bsc#1051510).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- pwm: clps711x: Fix period calculation (bsc#1051510).\n- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).\n- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n- random: move FIPS continuous test to output functions (bsc#1155334).\n- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n- regulator: tps65910: fix a missing check of return value (bsc#1051510).\n- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).\n- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_ops kerneldoc comment (bsc#1051510).\n- resource: fix locking in find_next_iomem_res() (bsc#1114279).\n- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages\n- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n- rpm/kernel-subpackage-spec: Unify dependency handling.\n- rpm/modules.fips: update module list (bsc#1157853)\n- rt2800: remove errornous duplicate condition (git-fixes).\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtl818x: fix potential use after free (bsc#1051510).\n- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n- s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n- s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n- s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390/idle: fix cpu idle time calculation (bsc#1051510).\n- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n- s390/process: avoid potential reading of freed stack (bsc#1051510).\n- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n- s390/qeth: clean up page frag creation (git-fixes).\n- s390/qeth: consolidate skb allocation (git-fixes).\n- s390/qeth: ensure linear access to packet headers (git-fixes).\n- s390/qeth: guard against runt packets (git-fixes).\n- s390/qeth: return proper errno on IO error (bsc#1051510).\n- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n- s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n- s390: fix stfle zero padding (bsc#1051510).\n- sc16is7xx: Fix for 'Unexpected interrupt: 8' (bsc#1051510).\n- sched/fair: Add tmp_alone_branch assertion (bnc#1156462).\n- sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).\n- sched/fair: Fix insertion in rq->leaf_cfs_rq_list (bnc#1156462).\n- sched/fair: Optimize update_blocked_averages() (bnc#1156462).\n- sched/fair: WARN() and refuse to set buddy when !se->on_rq (bsc#1158132).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Correctly retrieve and interpret active flash region (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n- scsi: zfcp: trace channel log even for FCP command responses (git-fixes).\n- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: max310x: Fix tx_empty() callback (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: Fix use-after-free Read in slip_open (bsc#1051510).\n- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n- smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).\n- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- spi: atmel: Fix CS high support (bsc#1051510).\n- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#1051510).\n- spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch (bsc#1051510).\n- spi: omap2-mcspi: Set FIFO DMA trigger level to word length (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n- spi: spidev: Fix OF tree warning logic (bsc#1051510).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- staging: rtl8192e: fix potential use after free (bsc#1051510).\n- staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids (bsc#1051510).\n- staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).\n- stm class: Fix a double free of stm_source_device (bsc#1051510).\n- supported.conf:\n- synclink_gt(): fix compat_ioctl() (bsc#1051510).\n- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n- thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).\n- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: check msg->req data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n- tipc: compat: allow tipc commands without arguments (bsc#1051510).\n- tipc: fix a missing check of genlmsg_put (bsc#1051510).\n- tipc: fix link name length check (bsc#1051510).\n- tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).\n- tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).\n- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n- tipc: handle the err returned from cmd header function (bsc#1051510).\n- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n- tipc: tipc clang warning (bsc#1051510).\n- tpm: add check after commands attribs tab allocation (bsc#1051510).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: msm_serial: Fix flow control (bsc#1051510).\n- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n- uaccess: Add non-pagefault user-space write function (bsc#1083647).\n- ubifs: Correctly initialize c->min_log_bytes (bsc#1158641).\n- ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 ('usb-storage: Set virt_boundary_mask to avoid SG overflows') (bsc#1051510).\n- usb: chipidea: Fix otg event handler (bsc#1051510).\n- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- usb: handle warm-reset port requests on hub resume (bsc#1051510).\n- usb: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- usb: xhci: only set D3hot for pci device (bsc#1051510).\n- usbip: Fix free of unallocated memory in vhci tx (git-fixes).\n- usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n- usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n- vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1 (bsc#1051510).\n- video/hdmi: Fix AVI bar unpack (git-fixes).\n- video: backlight: Add devres versions of of_find_backlight (bsc#1090888) Taken for 6010831dde5.\n- video: backlight: Add of_find_backlight helper in backlight.c (bsc#1090888) Taken for 6010831dde5.\n- virtio/s390: fix race on airq_areas (bsc#1051510).\n- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n- virtio_ring: fix return code on DMA mapping fails (git-fixes).\n- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n- watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n- watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n- x86/pkeys: Update documentation about availability (bsc#1078248).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).\n- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n- xfrm: Fix xfrm sel prefix length validation (git-fixes).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3381,SUSE-SLE-Module-Basesystem-15-2019-3381,SUSE-SLE-Module-Development-Tools-15-2019-3381,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3381,SUSE-SLE-Module-Legacy-15-2019-3381,SUSE-SLE-Module-Live-Patching-15-2019-3381,SUSE-SLE-Product-HA-15-2019-3381,SUSE-SLE-Product-WE-15-2019-3381", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3381-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3381-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193381-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3381-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html", }, { category: "self", summary: "SUSE Bug 1046303", url: "https://bugzilla.suse.com/1046303", }, { category: "self", summary: "SUSE Bug 1048942", url: "https://bugzilla.suse.com/1048942", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1082635", url: "https://bugzilla.suse.com/1082635", }, { category: "self", summary: "SUSE Bug 1083647", url: "https://bugzilla.suse.com/1083647", }, { category: "self", summary: "SUSE Bug 1089644", url: "https://bugzilla.suse.com/1089644", }, { category: "self", summary: "SUSE Bug 1090888", url: "https://bugzilla.suse.com/1090888", }, { category: "self", summary: "SUSE Bug 1091041", url: "https://bugzilla.suse.com/1091041", }, { category: "self", summary: "SUSE Bug 1104427", url: "https://bugzilla.suse.com/1104427", }, { category: "self", summary: "SUSE Bug 1108043", url: "https://bugzilla.suse.com/1108043", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1115026", url: "https://bugzilla.suse.com/1115026", }, { category: "self", summary: "SUSE Bug 1117169", url: "https://bugzilla.suse.com/1117169", }, { category: "self", summary: "SUSE Bug 1120853", url: "https://bugzilla.suse.com/1120853", }, { category: "self", summary: "SUSE Bug 1127371", url: "https://bugzilla.suse.com/1127371", }, { category: "self", summary: "SUSE Bug 1131107", url: "https://bugzilla.suse.com/1131107", }, { category: "self", summary: "SUSE Bug 1138039", url: "https://bugzilla.suse.com/1138039", }, { category: "self", summary: "SUSE Bug 1140948", url: "https://bugzilla.suse.com/1140948", }, { category: "self", summary: "SUSE Bug 1142095", url: "https://bugzilla.suse.com/1142095", }, { category: "self", summary: "SUSE Bug 1143706", url: "https://bugzilla.suse.com/1143706", }, { category: "self", summary: "SUSE Bug 1143959", url: "https://bugzilla.suse.com/1143959", }, { category: "self", summary: "SUSE Bug 1144333", url: "https://bugzilla.suse.com/1144333", }, { category: "self", summary: "SUSE Bug 1146519", url: "https://bugzilla.suse.com/1146519", }, { category: "self", summary: "SUSE Bug 1146544", url: "https://bugzilla.suse.com/1146544", }, { category: "self", summary: "SUSE Bug 1149448", url: "https://bugzilla.suse.com/1149448", }, { category: "self", summary: "SUSE Bug 1150466", url: "https://bugzilla.suse.com/1150466", }, { category: "self", summary: "SUSE Bug 1151548", url: "https://bugzilla.suse.com/1151548", }, { category: "self", summary: "SUSE Bug 1151900", url: "https://bugzilla.suse.com/1151900", }, { category: "self", summary: "SUSE Bug 1152631", url: "https://bugzilla.suse.com/1152631", }, { category: "self", summary: "SUSE Bug 1152782", url: "https://bugzilla.suse.com/1152782", }, { category: "self", summary: "SUSE Bug 1153628", url: "https://bugzilla.suse.com/1153628", }, { category: "self", summary: "SUSE Bug 1153681", url: "https://bugzilla.suse.com/1153681", }, { category: "self", summary: "SUSE Bug 1153811", url: "https://bugzilla.suse.com/1153811", }, { category: "self", summary: "SUSE Bug 1154043", url: "https://bugzilla.suse.com/1154043", }, { category: "self", summary: "SUSE Bug 1154058", url: "https://bugzilla.suse.com/1154058", }, { category: "self", summary: "SUSE Bug 1154124", url: "https://bugzilla.suse.com/1154124", }, { category: "self", summary: "SUSE Bug 1154355", url: "https://bugzilla.suse.com/1154355", }, { category: "self", summary: "SUSE Bug 1154526", url: "https://bugzilla.suse.com/1154526", }, { category: "self", summary: "SUSE Bug 1154956", url: "https://bugzilla.suse.com/1154956", }, { category: "self", summary: "SUSE Bug 1155021", url: "https://bugzilla.suse.com/1155021", }, { category: "self", summary: "SUSE Bug 1155331", url: "https://bugzilla.suse.com/1155331", }, { category: "self", summary: "SUSE Bug 1155334", url: "https://bugzilla.suse.com/1155334", }, { category: "self", summary: "SUSE Bug 1155689", url: "https://bugzilla.suse.com/1155689", }, { category: "self", summary: "SUSE Bug 1155692", url: "https://bugzilla.suse.com/1155692", }, { category: "self", summary: "SUSE Bug 1155836", url: "https://bugzilla.suse.com/1155836", }, { category: "self", summary: "SUSE Bug 1155897", url: "https://bugzilla.suse.com/1155897", }, { category: "self", summary: "SUSE Bug 1155921", url: "https://bugzilla.suse.com/1155921", }, { category: "self", summary: "SUSE Bug 1156187", url: "https://bugzilla.suse.com/1156187", }, { category: "self", summary: "SUSE Bug 1156258", url: "https://bugzilla.suse.com/1156258", }, { category: "self", summary: "SUSE Bug 1156259", url: "https://bugzilla.suse.com/1156259", }, { category: "self", summary: "SUSE Bug 1156429", url: "https://bugzilla.suse.com/1156429", }, { category: "self", summary: "SUSE Bug 1156462", url: "https://bugzilla.suse.com/1156462", }, { category: "self", summary: "SUSE Bug 1156466", url: "https://bugzilla.suse.com/1156466", }, { category: "self", summary: "SUSE Bug 1156471", url: "https://bugzilla.suse.com/1156471", }, { category: "self", summary: "SUSE Bug 1156494", url: "https://bugzilla.suse.com/1156494", }, { category: "self", summary: "SUSE Bug 1156609", url: "https://bugzilla.suse.com/1156609", }, { category: "self", summary: "SUSE Bug 1156700", url: "https://bugzilla.suse.com/1156700", }, { category: "self", summary: "SUSE Bug 1156729", url: "https://bugzilla.suse.com/1156729", }, { category: "self", summary: "SUSE Bug 1156882", url: "https://bugzilla.suse.com/1156882", }, { category: "self", summary: "SUSE Bug 1157038", url: "https://bugzilla.suse.com/1157038", }, { category: "self", summary: "SUSE Bug 1157042", url: "https://bugzilla.suse.com/1157042", }, { category: "self", summary: "SUSE Bug 1157070", url: "https://bugzilla.suse.com/1157070", }, { category: "self", summary: "SUSE Bug 1157143", url: "https://bugzilla.suse.com/1157143", }, { category: "self", summary: "SUSE Bug 1157145", url: "https://bugzilla.suse.com/1157145", }, { category: "self", summary: "SUSE Bug 1157158", url: "https://bugzilla.suse.com/1157158", }, { category: "self", summary: "SUSE Bug 1157162", url: "https://bugzilla.suse.com/1157162", }, { category: "self", summary: "SUSE Bug 1157169", url: "https://bugzilla.suse.com/1157169", }, { category: "self", summary: "SUSE Bug 1157171", url: "https://bugzilla.suse.com/1157171", }, { category: "self", summary: "SUSE Bug 1157173", url: "https://bugzilla.suse.com/1157173", }, { category: "self", summary: "SUSE Bug 1157178", url: "https://bugzilla.suse.com/1157178", }, { category: "self", summary: "SUSE Bug 1157180", url: "https://bugzilla.suse.com/1157180", }, { category: "self", summary: "SUSE Bug 1157182", url: "https://bugzilla.suse.com/1157182", }, { category: "self", summary: "SUSE Bug 1157183", url: "https://bugzilla.suse.com/1157183", }, { category: "self", summary: "SUSE Bug 1157184", url: "https://bugzilla.suse.com/1157184", }, { category: "self", summary: "SUSE Bug 1157191", url: "https://bugzilla.suse.com/1157191", }, { category: "self", summary: "SUSE Bug 1157193", url: "https://bugzilla.suse.com/1157193", }, { category: "self", summary: "SUSE Bug 1157197", url: "https://bugzilla.suse.com/1157197", }, { category: "self", summary: "SUSE Bug 1157298", url: "https://bugzilla.suse.com/1157298", }, { category: "self", summary: "SUSE Bug 1157303", url: "https://bugzilla.suse.com/1157303", }, { category: "self", summary: "SUSE Bug 1157307", url: "https://bugzilla.suse.com/1157307", }, { category: "self", summary: "SUSE Bug 1157324", url: "https://bugzilla.suse.com/1157324", }, { category: "self", summary: "SUSE Bug 1157333", url: "https://bugzilla.suse.com/1157333", }, { category: "self", summary: "SUSE Bug 1157424", url: "https://bugzilla.suse.com/1157424", }, { category: "self", summary: "SUSE Bug 1157463", url: "https://bugzilla.suse.com/1157463", }, { category: "self", summary: "SUSE Bug 1157499", url: "https://bugzilla.suse.com/1157499", }, { category: "self", summary: "SUSE Bug 1157678", url: "https://bugzilla.suse.com/1157678", }, { category: "self", summary: "SUSE Bug 1157698", url: "https://bugzilla.suse.com/1157698", }, { category: "self", summary: "SUSE Bug 1157778", url: "https://bugzilla.suse.com/1157778", }, { category: "self", summary: "SUSE Bug 1157853", url: "https://bugzilla.suse.com/1157853", }, { category: "self", summary: "SUSE Bug 1157908", url: "https://bugzilla.suse.com/1157908", }, { category: "self", summary: "SUSE Bug 1158049", url: "https://bugzilla.suse.com/1158049", }, { category: "self", summary: "SUSE Bug 1158063", url: "https://bugzilla.suse.com/1158063", }, { category: "self", summary: "SUSE Bug 1158064", url: "https://bugzilla.suse.com/1158064", }, { category: "self", summary: "SUSE Bug 1158065", url: "https://bugzilla.suse.com/1158065", }, { category: "self", summary: "SUSE Bug 1158066", url: "https://bugzilla.suse.com/1158066", }, { category: "self", summary: "SUSE Bug 1158067", url: "https://bugzilla.suse.com/1158067", }, { category: "self", summary: "SUSE Bug 1158068", url: "https://bugzilla.suse.com/1158068", }, { category: "self", summary: "SUSE Bug 1158082", url: "https://bugzilla.suse.com/1158082", }, { category: "self", summary: "SUSE Bug 1158094", url: "https://bugzilla.suse.com/1158094", }, { category: "self", summary: "SUSE Bug 1158132", url: "https://bugzilla.suse.com/1158132", }, { category: "self", summary: "SUSE Bug 1158381", url: "https://bugzilla.suse.com/1158381", }, { category: "self", summary: "SUSE Bug 1158394", url: "https://bugzilla.suse.com/1158394", }, { category: "self", summary: "SUSE Bug 1158398", url: "https://bugzilla.suse.com/1158398", }, { category: "self", summary: "SUSE Bug 1158407", url: "https://bugzilla.suse.com/1158407", }, { category: "self", summary: "SUSE Bug 1158410", url: "https://bugzilla.suse.com/1158410", }, { category: "self", summary: "SUSE Bug 1158413", url: "https://bugzilla.suse.com/1158413", }, { category: "self", summary: "SUSE Bug 1158417", url: "https://bugzilla.suse.com/1158417", }, { category: "self", summary: "SUSE Bug 1158427", url: "https://bugzilla.suse.com/1158427", }, { category: "self", summary: "SUSE Bug 1158445", url: "https://bugzilla.suse.com/1158445", }, { category: "self", summary: "SUSE Bug 1158533", url: "https://bugzilla.suse.com/1158533", }, { category: "self", summary: "SUSE Bug 1158637", url: "https://bugzilla.suse.com/1158637", }, { category: "self", summary: "SUSE Bug 1158638", url: "https://bugzilla.suse.com/1158638", }, { category: "self", summary: "SUSE Bug 1158639", url: "https://bugzilla.suse.com/1158639", }, { category: "self", summary: "SUSE Bug 1158640", url: "https://bugzilla.suse.com/1158640", }, { category: "self", summary: "SUSE Bug 1158641", url: "https://bugzilla.suse.com/1158641", }, { category: "self", summary: "SUSE Bug 1158643", url: "https://bugzilla.suse.com/1158643", }, { category: "self", summary: "SUSE Bug 1158644", url: "https://bugzilla.suse.com/1158644", }, { category: "self", summary: "SUSE Bug 1158645", url: "https://bugzilla.suse.com/1158645", }, { category: "self", summary: "SUSE Bug 1158646", url: "https://bugzilla.suse.com/1158646", }, { category: "self", summary: "SUSE Bug 1158647", url: "https://bugzilla.suse.com/1158647", }, { category: "self", summary: "SUSE Bug 1158649", url: "https://bugzilla.suse.com/1158649", }, { category: "self", summary: "SUSE Bug 1158651", url: "https://bugzilla.suse.com/1158651", }, { category: "self", summary: "SUSE Bug 1158652", url: "https://bugzilla.suse.com/1158652", }, { category: "self", summary: "SUSE Bug 1158823", url: "https://bugzilla.suse.com/1158823", }, { category: "self", summary: "SUSE Bug 1158824", url: "https://bugzilla.suse.com/1158824", }, { category: "self", summary: "SUSE Bug 1158827", url: "https://bugzilla.suse.com/1158827", }, { category: "self", summary: "SUSE Bug 1158834", url: "https://bugzilla.suse.com/1158834", }, { category: "self", summary: "SUSE Bug 1158893", url: "https://bugzilla.suse.com/1158893", }, { category: "self", summary: "SUSE Bug 1158900", url: "https://bugzilla.suse.com/1158900", }, { category: "self", summary: "SUSE Bug 1158903", url: "https://bugzilla.suse.com/1158903", }, { category: "self", summary: "SUSE Bug 1158904", url: "https://bugzilla.suse.com/1158904", }, { category: "self", summary: "SUSE Bug 1158954", url: "https://bugzilla.suse.com/1158954", }, { category: "self", summary: "SUSE Bug 1159024", url: "https://bugzilla.suse.com/1159024", }, { category: "self", summary: "SUSE Bug 1159297", url: "https://bugzilla.suse.com/1159297", }, { category: "self", summary: "SUSE CVE CVE-2019-14895 page", url: "https://www.suse.com/security/cve/CVE-2019-14895/", }, { category: "self", summary: "SUSE CVE CVE-2019-14901 page", url: "https://www.suse.com/security/cve/CVE-2019-14901/", }, { category: "self", summary: "SUSE CVE CVE-2019-15213 page", url: "https://www.suse.com/security/cve/CVE-2019-15213/", }, { category: "self", summary: "SUSE CVE CVE-2019-15916 page", url: "https://www.suse.com/security/cve/CVE-2019-15916/", }, { category: "self", summary: "SUSE CVE CVE-2019-16231 page", url: "https://www.suse.com/security/cve/CVE-2019-16231/", }, { category: "self", summary: "SUSE CVE CVE-2019-17055 page", url: "https://www.suse.com/security/cve/CVE-2019-17055/", }, { category: "self", summary: "SUSE CVE CVE-2019-18660 page", url: "https://www.suse.com/security/cve/CVE-2019-18660/", }, { category: "self", summary: "SUSE CVE CVE-2019-18683 page", url: "https://www.suse.com/security/cve/CVE-2019-18683/", }, { category: "self", summary: "SUSE CVE CVE-2019-18805 page", url: "https://www.suse.com/security/cve/CVE-2019-18805/", }, { category: "self", summary: "SUSE CVE CVE-2019-18808 page", url: "https://www.suse.com/security/cve/CVE-2019-18808/", }, { category: "self", summary: "SUSE CVE CVE-2019-18809 page", url: "https://www.suse.com/security/cve/CVE-2019-18809/", }, { category: "self", summary: "SUSE CVE CVE-2019-19049 page", url: "https://www.suse.com/security/cve/CVE-2019-19049/", }, { category: "self", summary: "SUSE CVE CVE-2019-19051 page", url: "https://www.suse.com/security/cve/CVE-2019-19051/", }, { category: "self", summary: "SUSE CVE CVE-2019-19052 page", url: "https://www.suse.com/security/cve/CVE-2019-19052/", }, { category: "self", summary: "SUSE CVE CVE-2019-19056 page", url: "https://www.suse.com/security/cve/CVE-2019-19056/", }, { category: "self", summary: "SUSE CVE CVE-2019-19057 page", url: "https://www.suse.com/security/cve/CVE-2019-19057/", }, { category: "self", summary: "SUSE CVE CVE-2019-19058 page", url: "https://www.suse.com/security/cve/CVE-2019-19058/", }, { category: "self", summary: "SUSE CVE CVE-2019-19060 page", url: "https://www.suse.com/security/cve/CVE-2019-19060/", }, { category: "self", summary: "SUSE CVE CVE-2019-19062 page", url: "https://www.suse.com/security/cve/CVE-2019-19062/", }, { category: "self", summary: "SUSE CVE CVE-2019-19063 page", url: "https://www.suse.com/security/cve/CVE-2019-19063/", }, { category: "self", summary: "SUSE CVE CVE-2019-19065 page", url: "https://www.suse.com/security/cve/CVE-2019-19065/", }, { category: "self", summary: "SUSE CVE CVE-2019-19066 page", url: "https://www.suse.com/security/cve/CVE-2019-19066/", }, { category: "self", summary: "SUSE CVE CVE-2019-19067 page", url: "https://www.suse.com/security/cve/CVE-2019-19067/", }, { category: "self", summary: "SUSE CVE CVE-2019-19068 page", url: "https://www.suse.com/security/cve/CVE-2019-19068/", }, { category: "self", summary: "SUSE CVE CVE-2019-19073 page", url: "https://www.suse.com/security/cve/CVE-2019-19073/", }, { category: "self", summary: "SUSE CVE CVE-2019-19074 page", url: "https://www.suse.com/security/cve/CVE-2019-19074/", }, { category: "self", summary: "SUSE CVE CVE-2019-19075 page", url: "https://www.suse.com/security/cve/CVE-2019-19075/", }, { category: "self", summary: "SUSE CVE CVE-2019-19077 page", url: "https://www.suse.com/security/cve/CVE-2019-19077/", }, { category: "self", summary: "SUSE CVE CVE-2019-19227 page", url: "https://www.suse.com/security/cve/CVE-2019-19227/", }, { category: "self", summary: "SUSE CVE CVE-2019-19332 page", url: "https://www.suse.com/security/cve/CVE-2019-19332/", }, { category: "self", summary: "SUSE CVE CVE-2019-19338 page", url: "https://www.suse.com/security/cve/CVE-2019-19338/", }, { category: "self", summary: "SUSE CVE CVE-2019-19523 page", url: "https://www.suse.com/security/cve/CVE-2019-19523/", }, { category: "self", summary: "SUSE CVE CVE-2019-19524 page", url: "https://www.suse.com/security/cve/CVE-2019-19524/", }, { category: "self", summary: "SUSE CVE CVE-2019-19525 page", url: "https://www.suse.com/security/cve/CVE-2019-19525/", }, { category: "self", summary: "SUSE CVE CVE-2019-19526 page", url: "https://www.suse.com/security/cve/CVE-2019-19526/", }, { category: "self", summary: "SUSE CVE CVE-2019-19527 page", url: "https://www.suse.com/security/cve/CVE-2019-19527/", }, { category: "self", summary: "SUSE CVE CVE-2019-19528 page", url: "https://www.suse.com/security/cve/CVE-2019-19528/", }, { category: "self", summary: "SUSE CVE CVE-2019-19529 page", url: "https://www.suse.com/security/cve/CVE-2019-19529/", }, { category: "self", summary: "SUSE CVE CVE-2019-19530 page", url: "https://www.suse.com/security/cve/CVE-2019-19530/", }, { category: "self", summary: "SUSE CVE CVE-2019-19531 page", url: "https://www.suse.com/security/cve/CVE-2019-19531/", }, { category: "self", summary: "SUSE CVE CVE-2019-19532 page", url: "https://www.suse.com/security/cve/CVE-2019-19532/", }, { category: "self", summary: "SUSE CVE CVE-2019-19533 page", url: "https://www.suse.com/security/cve/CVE-2019-19533/", }, { category: "self", summary: "SUSE CVE CVE-2019-19534 page", url: "https://www.suse.com/security/cve/CVE-2019-19534/", }, { category: "self", summary: "SUSE CVE CVE-2019-19535 page", url: "https://www.suse.com/security/cve/CVE-2019-19535/", }, { category: "self", summary: "SUSE CVE CVE-2019-19536 page", url: "https://www.suse.com/security/cve/CVE-2019-19536/", }, { category: "self", summary: "SUSE CVE CVE-2019-19537 page", url: "https://www.suse.com/security/cve/CVE-2019-19537/", }, { category: "self", summary: "SUSE CVE CVE-2019-19543 page", url: "https://www.suse.com/security/cve/CVE-2019-19543/", }, { category: "self", summary: "SUSE CVE CVE-2019-19767 page", url: "https://www.suse.com/security/cve/CVE-2019-19767/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-12-23T09:53:14Z", generator: { date: "2019-12-23T09:53:14Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3381-1", initial_release_date: "2019-12-23T09:53:14Z", revision_history: [ { date: "2019-12-23T09:53:14Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150.47.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-150.47.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150.47.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-150.47.1.aarch64", product_id: "dlm-kmp-default-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150.47.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-150.47.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-150.47.1.aarch64", product: { name: "kernel-default-4.12.14-150.47.1.aarch64", product_id: "kernel-default-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150.47.1.aarch64", product: { name: "kernel-default-base-4.12.14-150.47.1.aarch64", product_id: "kernel-default-base-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150.47.1.aarch64", product: { name: "kernel-default-devel-4.12.14-150.47.1.aarch64", product_id: "kernel-default-devel-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150.47.1.aarch64", product: { name: "kernel-default-extra-4.12.14-150.47.1.aarch64", product_id: "kernel-default-extra-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150.47.1.aarch64", product: { name: "kernel-default-livepatch-4.12.14-150.47.1.aarch64", product_id: "kernel-default-livepatch-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150.47.1.aarch64", product: { name: "kernel-default-livepatch-devel-4.12.14-150.47.1.aarch64", product_id: "kernel-default-livepatch-devel-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150.47.1.aarch64", product: { name: "kernel-obs-build-4.12.14-150.47.1.aarch64", product_id: "kernel-obs-build-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150.47.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-150.47.1.aarch64", product_id: "kernel-obs-qa-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150.47.1.aarch64", product: { name: "kernel-syms-4.12.14-150.47.1.aarch64", product_id: "kernel-syms-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150.47.1.aarch64", product: { name: "kernel-vanilla-4.12.14-150.47.1.aarch64", product_id: "kernel-vanilla-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150.47.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-150.47.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150.47.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-150.47.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150.47.1.aarch64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150.47.1.aarch64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150.47.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-150.47.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150.47.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-150.47.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-150.47.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150.47.1.aarch64", product: { name: "reiserfs-kmp-default-4.12.14-150.47.1.aarch64", product_id: "reiserfs-kmp-default-4.12.14-150.47.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-150.47.1.noarch", product: { name: "kernel-devel-4.12.14-150.47.1.noarch", product_id: "kernel-devel-4.12.14-150.47.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-150.47.1.noarch", product: { name: "kernel-docs-4.12.14-150.47.1.noarch", product_id: "kernel-docs-4.12.14-150.47.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-150.47.1.noarch", product: { name: "kernel-docs-html-4.12.14-150.47.1.noarch", product_id: "kernel-docs-html-4.12.14-150.47.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-150.47.1.noarch", product: { name: "kernel-macros-4.12.14-150.47.1.noarch", product_id: "kernel-macros-4.12.14-150.47.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-150.47.1.noarch", product: { name: "kernel-source-4.12.14-150.47.1.noarch", product_id: "kernel-source-4.12.14-150.47.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-150.47.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-150.47.1.noarch", product_id: "kernel-source-vanilla-4.12.14-150.47.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150.47.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-150.47.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150.47.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-150.47.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-150.47.1.ppc64le", product: { name: "kernel-debug-4.12.14-150.47.1.ppc64le", product_id: "kernel-debug-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-150.47.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-150.47.1.ppc64le", product_id: "kernel-debug-base-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-150.47.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-150.47.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-150.47.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-4.12.14-150.47.1.ppc64le", product_id: "kernel-debug-livepatch-devel-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-150.47.1.ppc64le", product: { name: "kernel-default-4.12.14-150.47.1.ppc64le", product_id: "kernel-default-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150.47.1.ppc64le", product: { name: "kernel-default-base-4.12.14-150.47.1.ppc64le", product_id: "kernel-default-base-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150.47.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-150.47.1.ppc64le", product_id: "kernel-default-devel-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150.47.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-150.47.1.ppc64le", product_id: "kernel-default-extra-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150.47.1.ppc64le", product: { name: "kernel-default-livepatch-4.12.14-150.47.1.ppc64le", product_id: "kernel-default-livepatch-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150.47.1.ppc64le", product: { name: "kernel-default-livepatch-devel-4.12.14-150.47.1.ppc64le", product_id: "kernel-default-livepatch-devel-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", product: { name: "kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", product_id: "kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150.47.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-150.47.1.ppc64le", product_id: "kernel-obs-build-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150.47.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-150.47.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150.47.1.ppc64le", product: { name: "kernel-syms-4.12.14-150.47.1.ppc64le", product_id: "kernel-syms-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150.47.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-150.47.1.ppc64le", product_id: "kernel-vanilla-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150.47.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-150.47.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150.47.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-150.47.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150.47.1.ppc64le", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150.47.1.ppc64le", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150.47.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-150.47.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", product: { name: "reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", product_id: "reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150.47.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-150.47.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150.47.1.s390x", product: { name: "dlm-kmp-default-4.12.14-150.47.1.s390x", product_id: "dlm-kmp-default-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150.47.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-150.47.1.s390x", product_id: "gfs2-kmp-default-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-150.47.1.s390x", product: { name: "kernel-default-4.12.14-150.47.1.s390x", product_id: "kernel-default-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150.47.1.s390x", product: { name: "kernel-default-base-4.12.14-150.47.1.s390x", product_id: "kernel-default-base-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150.47.1.s390x", product: { name: "kernel-default-devel-4.12.14-150.47.1.s390x", product_id: "kernel-default-devel-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150.47.1.s390x", product: { name: "kernel-default-extra-4.12.14-150.47.1.s390x", product_id: "kernel-default-extra-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150.47.1.s390x", product: { name: "kernel-default-livepatch-4.12.14-150.47.1.s390x", product_id: "kernel-default-livepatch-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150.47.1.s390x", product: { name: "kernel-default-livepatch-devel-4.12.14-150.47.1.s390x", product_id: "kernel-default-livepatch-devel-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-150.47.1.s390x", product: { name: "kernel-default-man-4.12.14-150.47.1.s390x", product_id: "kernel-default-man-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150.47.1.s390x", product: { name: "kernel-obs-build-4.12.14-150.47.1.s390x", product_id: "kernel-obs-build-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150.47.1.s390x", product: { name: "kernel-obs-qa-4.12.14-150.47.1.s390x", product_id: "kernel-obs-qa-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150.47.1.s390x", product: { name: "kernel-syms-4.12.14-150.47.1.s390x", product_id: "kernel-syms-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150.47.1.s390x", product: { name: "kernel-vanilla-4.12.14-150.47.1.s390x", product_id: "kernel-vanilla-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150.47.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-150.47.1.s390x", product_id: "kernel-vanilla-base-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150.47.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-150.47.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150.47.1.s390x", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150.47.1.s390x", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-150.47.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-150.47.1.s390x", product_id: "kernel-zfcpdump-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-150.47.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-150.47.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150.47.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-150.47.1.s390x", product_id: "kselftests-kmp-default-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150.47.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-150.47.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-150.47.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150.47.1.s390x", product: { name: "reiserfs-kmp-default-4.12.14-150.47.1.s390x", product_id: "reiserfs-kmp-default-4.12.14-150.47.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150.47.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-150.47.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150.47.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-150.47.1.x86_64", product_id: "dlm-kmp-default-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150.47.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-150.47.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-150.47.1.x86_64", product: { name: "kernel-debug-4.12.14-150.47.1.x86_64", product_id: "kernel-debug-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-150.47.1.x86_64", product: { name: "kernel-debug-base-4.12.14-150.47.1.x86_64", product_id: "kernel-debug-base-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-150.47.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-150.47.1.x86_64", product_id: "kernel-debug-devel-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-150.47.1.x86_64", product: { name: "kernel-debug-livepatch-devel-4.12.14-150.47.1.x86_64", product_id: "kernel-debug-livepatch-devel-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-150.47.1.x86_64", product: { name: "kernel-default-4.12.14-150.47.1.x86_64", product_id: "kernel-default-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150.47.1.x86_64", product: { name: "kernel-default-base-4.12.14-150.47.1.x86_64", product_id: "kernel-default-base-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150.47.1.x86_64", product: { name: "kernel-default-devel-4.12.14-150.47.1.x86_64", product_id: "kernel-default-devel-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150.47.1.x86_64", product: { name: "kernel-default-extra-4.12.14-150.47.1.x86_64", product_id: "kernel-default-extra-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150.47.1.x86_64", product: { name: "kernel-default-livepatch-4.12.14-150.47.1.x86_64", product_id: "kernel-default-livepatch-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150.47.1.x86_64", product: { name: "kernel-default-livepatch-devel-4.12.14-150.47.1.x86_64", product_id: "kernel-default-livepatch-devel-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-150.47.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-150.47.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-150.47.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-150.47.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-150.47.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-150.47.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-4.12.14-150.47.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-4.12.14-150.47.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", product: { name: "kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", product_id: "kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150.47.1.x86_64", product: { name: "kernel-obs-build-4.12.14-150.47.1.x86_64", product_id: "kernel-obs-build-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150.47.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-150.47.1.x86_64", product_id: "kernel-obs-qa-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150.47.1.x86_64", product: { name: "kernel-syms-4.12.14-150.47.1.x86_64", product_id: "kernel-syms-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150.47.1.x86_64", product: { name: "kernel-vanilla-4.12.14-150.47.1.x86_64", product_id: "kernel-vanilla-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150.47.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-150.47.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150.47.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-150.47.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150.47.1.x86_64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150.47.1.x86_64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150.47.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-150.47.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150.47.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-150.47.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-150.47.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150.47.1.x86_64", product: { name: "reiserfs-kmp-default-4.12.14-150.47.1.x86_64", product_id: "reiserfs-kmp-default-4.12.14-150.47.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15", product: { name: "SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15", product: { name: "SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15", product: { name: "SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15", product: { name: "SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15", product: { name: "SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15", product: { name: "SUSE Linux Enterprise Workstation Extension 15", product_id: "SUSE Linux Enterprise Workstation Extension 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.47.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", }, product_reference: "kernel-default-4.12.14-150.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.47.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", }, product_reference: "kernel-default-4.12.14-150.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", }, product_reference: "kernel-default-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", }, product_reference: "kernel-default-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.47.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-150.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.47.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-150.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", }, product_reference: "kernel-default-base-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.47.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-150.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.47.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-150.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", }, product_reference: "kernel-default-man-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-150.47.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", }, product_reference: "kernel-devel-4.12.14-150.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-150.47.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", }, product_reference: "kernel-macros-4.12.14-150.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", }, product_reference: "kernel-zfcpdump-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-150.47.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", }, product_reference: "kernel-docs-4.12.14-150.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.47.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-150.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.47.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-150.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-150.47.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", }, product_reference: "kernel-source-4.12.14-150.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.47.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", }, product_reference: "kernel-syms-4.12.14-150.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.47.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-150.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", }, product_reference: "kernel-syms-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", }, product_reference: "kernel-syms-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.47.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", }, product_reference: "kernel-vanilla-base-4.12.14-150.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.47.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", }, product_reference: "kernel-vanilla-base-4.12.14-150.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", }, product_reference: "kernel-vanilla-base-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", product_id: "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.47.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", }, product_reference: "reiserfs-kmp-default-4.12.14-150.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.47.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", }, product_reference: "reiserfs-kmp-default-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", product_id: "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-150.47.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", }, product_reference: "kernel-default-livepatch-4.12.14-150.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", }, product_reference: "kernel-default-livepatch-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", }, product_reference: "kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150.47.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", }, product_reference: "cluster-md-kmp-default-4.12.14-150.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150.47.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150.47.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", }, product_reference: "dlm-kmp-default-4.12.14-150.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150.47.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-150.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150.47.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", }, product_reference: "gfs2-kmp-default-4.12.14-150.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150.47.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-150.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150.47.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", }, product_reference: "ocfs2-kmp-default-4.12.14-150.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150.47.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150.47.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-150.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-150.47.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", product_id: "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", }, product_reference: "kernel-default-extra-4.12.14-150.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15", }, ], }, vulnerabilities: [ { cve: "CVE-2019-14895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14895", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14895", url: "https://www.suse.com/security/cve/CVE-2019-14895", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1157158 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157158", }, { category: "external", summary: "SUSE Bug 1173100 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173100", }, { category: "external", summary: "SUSE Bug 1173660 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "important", }, ], title: "CVE-2019-14895", }, { cve: "CVE-2019-14901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14901", }, ], notes: [ { category: "general", text: "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14901", url: "https://www.suse.com/security/cve/CVE-2019-14901", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14901", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1173661 for CVE-2019-14901", url: "https://bugzilla.suse.com/1173661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "important", }, ], title: "CVE-2019-14901", }, { cve: "CVE-2019-15213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15213", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15213", url: "https://www.suse.com/security/cve/CVE-2019-15213", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146544 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146544", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-15213", }, { cve: "CVE-2019-15916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15916", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15916", url: "https://www.suse.com/security/cve/CVE-2019-15916", }, { category: "external", summary: "SUSE Bug 1149448 for CVE-2019-15916", url: "https://bugzilla.suse.com/1149448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "low", }, ], title: "CVE-2019-15916", }, { cve: "CVE-2019-16231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16231", }, ], notes: [ { category: "general", text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16231", url: "https://www.suse.com/security/cve/CVE-2019-16231", }, { category: "external", summary: "SUSE Bug 1150466 for CVE-2019-16231", url: "https://bugzilla.suse.com/1150466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "low", }, ], title: "CVE-2019-16231", }, { cve: "CVE-2019-17055", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17055", }, ], notes: [ { category: "general", text: "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17055", url: "https://www.suse.com/security/cve/CVE-2019-17055", }, { category: "external", summary: "SUSE Bug 1152782 for CVE-2019-17055", url: "https://bugzilla.suse.com/1152782", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "low", }, ], title: "CVE-2019-17055", }, { cve: "CVE-2019-18660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18660", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18660", url: "https://www.suse.com/security/cve/CVE-2019-18660", }, { category: "external", summary: "SUSE Bug 1157038 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157038", }, { category: "external", summary: "SUSE Bug 1157923 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-18660", }, { cve: "CVE-2019-18683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18683", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18683", url: "https://www.suse.com/security/cve/CVE-2019-18683", }, { category: "external", summary: "SUSE Bug 1155897 for CVE-2019-18683", url: "https://bugzilla.suse.com/1155897", }, { category: "external", summary: "SUSE Bug 1173868 for CVE-2019-18683", url: "https://bugzilla.suse.com/1173868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-18683", }, { cve: "CVE-2019-18805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18805", }, ], notes: [ { category: "general", text: "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18805", url: "https://www.suse.com/security/cve/CVE-2019-18805", }, { category: "external", summary: "SUSE Bug 1156187 for CVE-2019-18805", url: "https://bugzilla.suse.com/1156187", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "low", }, ], title: "CVE-2019-18805", }, { cve: "CVE-2019-18808", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18808", }, ], notes: [ { category: "general", text: "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18808", url: "https://www.suse.com/security/cve/CVE-2019-18808", }, { category: "external", summary: "SUSE Bug 1156259 for CVE-2019-18808", url: "https://bugzilla.suse.com/1156259", }, { category: "external", summary: "SUSE Bug 1189884 for CVE-2019-18808", url: "https://bugzilla.suse.com/1189884", }, { category: "external", summary: "SUSE Bug 1190534 for CVE-2019-18808", url: "https://bugzilla.suse.com/1190534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-18808", }, { cve: "CVE-2019-18809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18809", }, ], notes: [ { category: "general", text: "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18809", url: "https://www.suse.com/security/cve/CVE-2019-18809", }, { category: "external", summary: "SUSE Bug 1156258 for CVE-2019-18809", url: "https://bugzilla.suse.com/1156258", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-18809", }, { cve: "CVE-2019-19049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19049", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19049", url: "https://www.suse.com/security/cve/CVE-2019-19049", }, { category: "external", summary: "SUSE Bug 1157173 for CVE-2019-19049", url: "https://bugzilla.suse.com/1157173", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19049", }, { cve: "CVE-2019-19051", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19051", }, ], notes: [ { category: "general", text: "A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19051", url: "https://www.suse.com/security/cve/CVE-2019-19051", }, { category: "external", summary: "SUSE Bug 1159024 for CVE-2019-19051", url: "https://bugzilla.suse.com/1159024", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19051", }, { cve: "CVE-2019-19052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19052", }, ], notes: [ { category: "general", text: "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19052", url: "https://www.suse.com/security/cve/CVE-2019-19052", }, { category: "external", summary: "SUSE Bug 1157324 for CVE-2019-19052", url: "https://bugzilla.suse.com/1157324", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19052", }, { cve: "CVE-2019-19056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19056", }, ], notes: [ { category: "general", text: "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19056", url: "https://www.suse.com/security/cve/CVE-2019-19056", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19056", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19057", }, ], notes: [ { category: "general", text: "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19057", url: "https://www.suse.com/security/cve/CVE-2019-19057", }, { category: "external", summary: "SUSE Bug 1157193 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157193", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "low", }, ], title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19058", }, ], notes: [ { category: "general", text: "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19058", url: "https://www.suse.com/security/cve/CVE-2019-19058", }, { category: "external", summary: "SUSE Bug 1157145 for CVE-2019-19058", url: "https://bugzilla.suse.com/1157145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19058", }, { cve: "CVE-2019-19060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19060", }, ], notes: [ { category: "general", text: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19060", url: "https://www.suse.com/security/cve/CVE-2019-19060", }, { category: "external", summary: "SUSE Bug 1157178 for CVE-2019-19060", url: "https://bugzilla.suse.com/1157178", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19060", }, { cve: "CVE-2019-19062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19062", }, ], notes: [ { category: "general", text: "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19062", url: "https://www.suse.com/security/cve/CVE-2019-19062", }, { category: "external", summary: "SUSE Bug 1157333 for CVE-2019-19062", url: "https://bugzilla.suse.com/1157333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19063", }, ], notes: [ { category: "general", text: "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19063", url: "https://www.suse.com/security/cve/CVE-2019-19063", }, { category: "external", summary: "SUSE Bug 1157298 for CVE-2019-19063", url: "https://bugzilla.suse.com/1157298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19063", }, { cve: "CVE-2019-19065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19065", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19065", url: "https://www.suse.com/security/cve/CVE-2019-19065", }, { category: "external", summary: "SUSE Bug 1157191 for CVE-2019-19065", url: "https://bugzilla.suse.com/1157191", }, { category: "external", summary: "SUSE Bug 1173961 for CVE-2019-19065", url: "https://bugzilla.suse.com/1173961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "important", }, ], title: "CVE-2019-19065", }, { cve: "CVE-2019-19066", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19066", }, ], notes: [ { category: "general", text: "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19066", url: "https://www.suse.com/security/cve/CVE-2019-19066", }, { category: "external", summary: "SUSE Bug 1157303 for CVE-2019-19066", url: "https://bugzilla.suse.com/1157303", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19066", }, { cve: "CVE-2019-19067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19067", }, ], notes: [ { category: "general", text: "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19067", url: "https://www.suse.com/security/cve/CVE-2019-19067", }, { category: "external", summary: "SUSE Bug 1157180 for CVE-2019-19067", url: "https://bugzilla.suse.com/1157180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19068", }, ], notes: [ { category: "general", text: "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19068", url: "https://www.suse.com/security/cve/CVE-2019-19068", }, { category: "external", summary: "SUSE Bug 1157307 for CVE-2019-19068", url: "https://bugzilla.suse.com/1157307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19068", }, { cve: "CVE-2019-19073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19073", }, ], notes: [ { category: "general", text: "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19073", url: "https://www.suse.com/security/cve/CVE-2019-19073", }, { category: "external", summary: "SUSE Bug 1157070 for CVE-2019-19073", url: "https://bugzilla.suse.com/1157070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19074", }, ], notes: [ { category: "general", text: "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19074", url: "https://www.suse.com/security/cve/CVE-2019-19074", }, { category: "external", summary: "SUSE Bug 1157143 for CVE-2019-19074", url: "https://bugzilla.suse.com/1157143", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19075", }, ], notes: [ { category: "general", text: "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19075", url: "https://www.suse.com/security/cve/CVE-2019-19075", }, { category: "external", summary: "SUSE Bug 1157162 for CVE-2019-19075", url: "https://bugzilla.suse.com/1157162", }, { category: "external", summary: "SUSE Bug 1173958 for CVE-2019-19075", url: "https://bugzilla.suse.com/1173958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "low", }, ], title: "CVE-2019-19075", }, { cve: "CVE-2019-19077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19077", }, ], notes: [ { category: "general", text: "A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19077", url: "https://www.suse.com/security/cve/CVE-2019-19077", }, { category: "external", summary: "SUSE Bug 1157171 for CVE-2019-19077", url: "https://bugzilla.suse.com/1157171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19077", }, { cve: "CVE-2019-19227", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19227", }, ], notes: [ { category: "general", text: "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19227", url: "https://www.suse.com/security/cve/CVE-2019-19227", }, { category: "external", summary: "SUSE Bug 1157678 for CVE-2019-19227", url: "https://bugzilla.suse.com/1157678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19227", }, { cve: "CVE-2019-19332", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19332", }, ], notes: [ { category: "general", text: "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19332", url: "https://www.suse.com/security/cve/CVE-2019-19332", }, { category: "external", summary: "SUSE Bug 1158827 for CVE-2019-19332", url: "https://bugzilla.suse.com/1158827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19332", }, { cve: "CVE-2019-19338", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19338", }, ], notes: [ { category: "general", text: "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19338", url: "https://www.suse.com/security/cve/CVE-2019-19338", }, { category: "external", summary: "SUSE Bug 1158954 for CVE-2019-19338", url: "https://bugzilla.suse.com/1158954", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19338", }, { cve: "CVE-2019-19523", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19523", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19523", url: "https://www.suse.com/security/cve/CVE-2019-19523", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158823 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158823", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19523", }, { cve: "CVE-2019-19524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19524", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19524", url: "https://www.suse.com/security/cve/CVE-2019-19524", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158413 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158413", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "low", }, ], title: "CVE-2019-19524", }, { cve: "CVE-2019-19525", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19525", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19525", url: "https://www.suse.com/security/cve/CVE-2019-19525", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158417 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158417", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19525", }, { cve: "CVE-2019-19526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19526", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19526", url: "https://www.suse.com/security/cve/CVE-2019-19526", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158893 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19526", }, { cve: "CVE-2019-19527", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19527", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19527", url: "https://www.suse.com/security/cve/CVE-2019-19527", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158900 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158900", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19527", }, { cve: "CVE-2019-19528", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19528", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19528", url: "https://www.suse.com/security/cve/CVE-2019-19528", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158407 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158407", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19528", }, { cve: "CVE-2019-19529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19529", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19529", url: "https://www.suse.com/security/cve/CVE-2019-19529", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19529", }, { cve: "CVE-2019-19530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19530", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19530", url: "https://www.suse.com/security/cve/CVE-2019-19530", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158410 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158410", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19530", }, { cve: "CVE-2019-19531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19531", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19531", url: "https://www.suse.com/security/cve/CVE-2019-19531", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158427", }, { category: "external", summary: "SUSE Bug 1158445 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158445", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "low", }, ], title: "CVE-2019-19531", }, { cve: "CVE-2019-19532", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19532", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19532", url: "https://www.suse.com/security/cve/CVE-2019-19532", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158823 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158823", }, { category: "external", summary: "SUSE Bug 1158824 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158824", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19532", }, { cve: "CVE-2019-19533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19533", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19533", url: "https://www.suse.com/security/cve/CVE-2019-19533", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19533", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19533", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "low", }, ], title: "CVE-2019-19533", }, { cve: "CVE-2019-19534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19534", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19534", url: "https://www.suse.com/security/cve/CVE-2019-19534", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158398 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158398", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "low", }, ], title: "CVE-2019-19534", }, { cve: "CVE-2019-19535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19535", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19535", url: "https://www.suse.com/security/cve/CVE-2019-19535", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158903 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19535", }, { cve: "CVE-2019-19536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19536", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19536", url: "https://www.suse.com/security/cve/CVE-2019-19536", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158394 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158394", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "low", }, ], title: "CVE-2019-19536", }, { cve: "CVE-2019-19537", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19537", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19537", url: "https://www.suse.com/security/cve/CVE-2019-19537", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158904 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19537", }, { cve: "CVE-2019-19543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19543", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19543", url: "https://www.suse.com/security/cve/CVE-2019-19543", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19543", url: "https://bugzilla.suse.com/1158427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "low", }, ], title: "CVE-2019-19543", }, { cve: "CVE-2019-19767", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19767", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19767", url: "https://www.suse.com/security/cve/CVE-2019-19767", }, { category: "external", summary: "SUSE Bug 1159297 for CVE-2019-19767", url: "https://bugzilla.suse.com/1159297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-1-1.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.47.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-23T09:53:14Z", details: "moderate", }, ], title: "CVE-2019-19767", }, ], }
suse-su-2020:0613-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP1 real-time kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-14615: An information disclosure vulnerability existed due to insufficient control flow in certain data structures for some Intel(R) Processors (bnc#1160195).\n- CVE-2019-14895: A heap-based buffer overflow was discovered in the Marvell WiFi driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-14896: A heap overflow was found in the add_ie_rates() function of the Marvell Wifi Driver (bsc#1157157).\n- CVE-2019-14897: A stack overflow was found in the lbs_ibss_join_existing() function of the Marvell Wifi Driver (bsc#1157155).\n- CVE-2019-14901: A heap overflow flaw was found in the Marvell WiFi driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code (bnc#1157042).\n- CVE-2019-15213: A use-after-free bug caused by a malicious USB device was found in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c. The check for the length of variable elements in a beacon head was insufficient, leading to a buffer overflow (bnc#1152107).\n- CVE-2019-16994: A memory leak existed in sit_init_net() in net/ipv6/sit.c which might have caused denial of service, aka CID-07f12b26e21a (bnc#1161523).\n- CVE-2019-18660: An information disclosure bug occured because the Spectre-RSB mitigation were not in place for all applicable CPUs, aka CID-39e72bf96f58 (bnc#1157038).\n- CVE-2019-18683: Multiple race conditions were discovered in drivers/media/platform/vivid. It was exploitable for privilege escalation if local users had access to /dev/video0, but only if the driver happened to be loaded. At least one of these race conditions led to a use-after-free (bnc#1155897).\n- CVE-2019-18808: A memory leak in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption), aka CID-128c66429247 (bnc#1156259).\n- CVE-2019-18809: A memory leak in drivers/media/usb/dvb-usb/af9005.c allowed attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559 (bnc#1156258).\n- CVE-2019-19036: An issue discovered in btrfs_root_node in fs/btrfs/ctree.c allowed a NULL pointer dereference because rcu_dereference(root->node) can be zero (bnc#1157692).\n- CVE-2019-19045: A memory leak in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7 (bnc#1161522).\n- CVE-2019-19046: There was a memory leak in __ipmi_bmc_register (bsc#1157304).\n- CVE-2019-19049: There was an unlikely memory leak in unittest_data_add (bsc#1157173).\n- CVE-2019-19051: A memory leak in drivers/net/wimax/i2400m/op-rfkill.c allowed attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7 (bnc#1159024).\n- CVE-2019-19052: A memory leak in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption), aka CID-fb5be6a7b486 (bnc#1157324).\n- CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b (bnc#1161518).\n- CVE-2019-19056: A memory leak in drivers/net/wireless/marvell/mwifiex/pcie.c allowed attackers to cause a denial of service (memory consumption), aka CID-db8fd2cde932 (bnc#1157197).\n- CVE-2019-19057: Two memory leaks in drivers/net/wireless/marvell/mwifiex/pcie.c allowed attackers to cause a denial of service (memory consumption), aka CID-d10dcb615c8e (bnc#1157193 bsc#1157197).\n- CVE-2019-19058: A memory leak in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allowed attackers to cause a denial of service (memory consumption), aka CID-b4b814fec1a5 (bnc#1157145).\n- CVE-2019-19060: A memory leak in drivers/iio/imu/adis_buffer.c allowed attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41 (bnc#1157178).\n- CVE-2019-19062: A memory leak in crypto/crypto_user_base.c allowed attackers to cause a denial of service (memory consumption), aka CID-ffdde5932042 (bnc#1157333).\n- CVE-2019-19063: Two memory leaks in drivers/net/wireless/realtek/rtlwifi/usb.c allowed attackers to cause a denial of service (memory consumption), aka CID-3f9361695113 (bnc#1157298).\n- CVE-2019-19065: A memory leak in drivers/infiniband/hw/hfi1/sdma.c allowed attackers to cause a denial of service (memory consumption), aka CID-34b3be18a04e (bnc#1157191).\n- CVE-2019-19066: A memory leak in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service (memory consumption), aka CID-0e62395da2bd (bnc#1157303).\n- CVE-2019-19067: There were four unlikely memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c (bnc#1157180).\n- CVE-2019-19068: A memory leak in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allowed attackers to cause a denial of service (memory consumption), aka CID-a2cdd07488e6 (bnc#1157307).\n- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption), aka CID-853acf7caf10 (bnc#1157070).\n- CVE-2019-19074: A memory leak in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4 (bnc#1157143).\n- CVE-2019-19075: A memory leak in drivers/net/ieee802154/ca8210.c allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e (bnc#1157162).\n- CVE-2019-19077: A memory leak in drivers/infiniband/hw/bnxt_re/ib_verbs.c allowed attackers to cause a denial of service (memory consumption), aka CID-4a9d46a9fe14 (bnc#1157171).\n- CVE-2019-19078: A memory leak in drivers/net/wireless/ath/ath10k/usb.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2 (bnc#1157032).\n- CVE-2019-19080: Four memory leaks in drivers/net/ethernet/netronome/nfp/flower/main.c allowed attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a (bnc#1157044).\n- CVE-2019-19081: A memory leak in drivers/net/ethernet/netronome/nfp/flower/main.c allowed attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a (bnc#1157045).\n- CVE-2019-19082: Memory leaks were found in the *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc, aka CID-104c307147ad (bnc#1157046).\n- CVE-2019-19083: Memory leaks were found in the *clock_source_create() functions under drivers/gpu/drm/amd/display/dc, aka CID-055e547478a1 (bnc#1157049).\n- CVE-2019-19227: In the AppleTalk subsystem there was a potential NULL pointer dereference because register_snap_client may return NULL. This could have led to denial of service, aka CID-9804501fa122 (bnc#1157678).\n- CVE-2019-19318: Mounting a crafted btrfs image twice could have caused a use-after-free (bnc#1158026).\n- CVE-2019-19319: A slab-out-of-bounds write access could have occured when setxattr was called after mounting of a specially crafted ext4 image (bnc#1158021).\n- CVE-2019-19332: An out-of-bounds memory write issue was found in the way the KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could have used this flaw to crash the system (bnc#1158827).\n- CVE-2019-19338: There was an incomplete fix for an issue with Transactional Synchronisation Extensions in the KVM code (bsc#1158954).\n- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting could have led to a use-after-free in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19523: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bsc#1158823).\n- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9 (bsc#1158413).\n- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035 (bsc#1158417).\n- CVE-2019-19526: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098 (bsc#1158893).\n- CVE-2019-19527: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e (bsc#1158900).\n- CVE-2019-19528: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d (bsc#1158407).\n- CVE-2019-19529: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41 (bnc#1158381).\n- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef (bsc#1158410).\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca (bsc#1158445).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that can be caused by a malicious USB HID device, aka CID-d9d4b1e46d95 (bsc#1158824).\n- CVE-2019-19533: There was an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464 (bsc#1158834).\n- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29 (bsc#1158398).\n- CVE-2019-19535: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042 (bsc#1158903).\n- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0 (bsc#1158394).\n- CVE-2019-19537: There was a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9 (bsc#1158904).\n- CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).\n- CVE-2019-19767: There were multiple use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163 (bnc#1159297).\n- CVE-2019-19927: A slab-out-of-bounds read access occured when mounting a crafted f2fs filesystem image and performing some operations on it (bnc#1160147).\n- CVE-2019-19965: There was a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5 (bnc#1159911).\n- CVE-2019-19966: There was a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that could have caused a denial of service, aka CID-dea37a972655 (bnc#1159841).\n- CVE-2019-20054: There was a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e (bnc#1159910).\n- CVE-2019-20095: Several memory leaks were found in drivers/net/wireless/marvell/mwifiex/cfg80211.c, aka CID-003b686ace82 (bnc#1159909).\n- CVE-2019-20096: There was a memory leak in __feat_register_sp() in net/dccp/feat.c, aka CID-1d3ff0950e2b (bnc#1159908).\n- CVE-2020-7053: There was a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c (bnc#1160966).\n- CVE-2020-8428: There was a use-after-free bug in fs/namei.c, which allowed local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9 (bnc#1162109).\n\n\nThe following non-security bugs were fixed:\n\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- a typo in %kernel_base_conflicts macro name\n- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI / hotplug / PCI: Allocate resources directly under the non-hotplug bridge (bsc#1111666).\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).\n- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n- ACPI/nfit, device-dax: Identify differentiated memory with a unique numa-node (bsc#1158071).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- ACPI: OSL: only free map once in osl.c (bsc#1051510).\n- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).\n- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: 6fire: Drop the dead code (git-fixes).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).\n- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n- ALSA: hda - Apply sync-write workaround to old Intel platforms, too (bsc#1111666).\n- ALSA: hda - constify and cleanup static NodeID tables (bsc#1111666).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n- ALSA: hda - fixup for the bass speaker on Lenovo Carbon X1 7th gen (git-fixes).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda/hdmi - Clear codec->relaxed_resume flag at unbinding (git-fixes).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).\n- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).\n- ALSA: hda/realtek - Add Bass Speaker and fixed dac for bass speaker (bsc#1111666).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: hda/realtek - Add Headset Mic supported for HP cPC (bsc#1111666).\n- ALSA: hda/realtek - Add new codec supported for ALCS1200A (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for the bass speaker on Lenovo Yoga X1 7th gen (bsc#1111666).\n- ALSA: hda/realtek - Apply mic mute LED quirk for Dell E7xx laptops, too (bsc#1111666).\n- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).\n- ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC (git-fixes).\n- ALSA: hda/realtek - Enable the bass speaker of ASUS UX431FLC (bsc#1111666).\n- ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop (git-fixes).\n- ALSA: hda/realtek - Fix inverted bass GPIO pin on Acer 8951G (git-fixes).\n- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).\n- ALSA: hda/realtek - More constifications (bsc#1111666).\n- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Set EAPD control to default for ALC222 (bsc#1111666).\n- ALSA: hda: constify copied structure (bsc#1111666).\n- ALSA: hda: Constify snd_kcontrol_new items (bsc#1111666).\n- ALSA: hda: Constify snd_pci_quirk tables (bsc#1111666).\n- ALSA: hda: correct kernel-doc parameter descriptions (bsc#1111666).\n- ALSA: hda: Fix racy display power access (bsc#1156928).\n- ALSA: hda: hdmi - fix port numbering for ICL and TGL platforms (git-fixes).\n- ALSA: hda: hdmi - remove redundant code comments (git-fixes).\n- ALSA: hda: More constifications (bsc#1111666).\n- ALSA: hda: patch_hdmi: remove warnings with empty body (bsc#1111666).\n- ALSA: hda: patch_realtek: fix empty macro usage in if block (bsc#1111666).\n- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: pcm: Yet another missing check of non-cached buffer type (bsc#1111666).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: sh: Fix unused variable warnings (bsc#1111666).\n- ALSA: usb-audio: Add skip_validation option (git-fixes).\n- ALSA: usb-audio: Apply the sample rate quirk for Bose Companion 5 (bsc#1111666).\n- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n- ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk() (git-fixes).\n- ALSA: usb-audio: Fix incorrect size check for processing/extension units (git-fixes).\n- ALSA: usb-audio: Fix NULL dereference at parsing BADD (git-fixes).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: sound: usb: usb true/false for bool return type (git-fixes).\n- apparmor: fix unsigned len comparison with less than zero (git-fixes).\n- appledisplay: fix error handling in the scheduled work (git-fixes).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).\n- ASoC: cs4349: Use PM ops 'cs4349_runtime_pm' (bsc#1051510).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: samsung: i2s: Fix prescaler setting for the secondary DAI (bsc#1111666).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ata: ep93xx: Use proper enums for directions (bsc#1051510).\n- ath10k: allocate small size dma memory in ath10k_pci_diag_write_mem (bsc#1111666).\n- ath10k: avoid possible memory access violation (bsc#1111666).\n- ath10k: Correct error handling of dma_map_single() (bsc#1111666).\n- ath10k: Correct the DMA direction for management tx buffers (bsc#1111666).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: fix vdev-start timeout on error (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: pci: Fix comment on ath10k_pci_dump_memory_sram (bsc#1111666).\n- ath10k: pci: Only dump ATH10K_MEM_REGION_TYPE_IOREG when safe (bsc#1111666).\n- ath10k: skip resetting rx filter for WCN3990 (bsc#1111666).\n- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n- ath6kl: Fix off by one error in scan completion (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- ath9k_hw: fix uninitialized variable data (bsc#1051510).\n- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).\n- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcma: remove set but not used variable 'sizel' (git-fixes).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1159377).\n- blk-mq: make sure that line break can be printed (bsc#1159377).\n- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n- Bluetooth: delete a stray unlock (bsc#1051510).\n- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).\n- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- bnxt: apply computed clamp value for coalece parameter (bsc#1104745).\n- bnxt_en: Fix MSIX request logic for RDMA driver (bsc#1104745 ).\n- bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands (bsc#1104745).\n- bnxt_en: Return error if FW returns more data than dump length (bsc#1104745).\n- bnxt_en: Update firmware interface spec. to 1.10.0.47 (bsc#1157115)\n- bnxt_en: Update firmware interface spec. to 1.10.0.89 (bsc#1157115)\n- bnxt_en: Update firmware interface to 1.10.0.69 (bsc#1157115)\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).\n- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- bpf, offload: Unlock on error in bpf_offload_dev_create() (bsc#1109837).\n- bpf/sockmap: Read psock ingress_msg before sk_receive_queue (bsc#1083647).\n- bpf/stackmap: Fix deadlock with rq_lock in bpf_get_stack() (bsc#1083647).\n- bpf: add self-check logic to liveness analysis (bsc#1160618).\n- bpf: add verifier stats and log_level bit 2 (bsc#1160618).\n- bpf: fix BTF limits (bsc#1109837).\n- bpf: fix BTF verification of enums (bsc#1109837).\n- bpf: Fix incorrect verifier simulation of ARSH under ALU32 (bsc#1083647).\n- bpf: Fix use after free in subprog's jited symbol removal (bsc#1109837).\n- bpf: improve stacksafe state comparison (bco#1160618).\n- bpf: improve verification speed by droping states (bsc#1160618).\n- bpf: improve verification speed by not remarking live_read (bsc#1160618).\n- bpf: improve verifier branch analysis (bsc#1160618).\n- bpf: increase complexity limit and maximum program size (bsc#1160618).\n- bpf: increase verifier log limit (bsc#1160618).\n- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).\n- bpf: Reject indirect var_off stack access in raw mode (bsc#1160618).\n- bpf: Reject indirect var_off stack access in unpriv mode (bco#1160618).\n- bpf: Sanity check max value for var_off stack access (bco#1160618).\n- bpf: skmsg, fix potential psock NULL pointer dereference (bsc#1109837).\n- bpf: speed up stacksafe check (bco#1160618).\n- bpf: Support variable offset stack access from helpers (bco#1160618).\n- bpf: verifier: teach the verifier to reason about the BPF_JSET instruction (bco#1160618).\n- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_p2p_create_p2pdev() (bsc#1111666).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- brcmfmac: fix wrong strnchr usage (bsc#1111666).\n- brcmfmac: increase buffer for obtaining firmware capabilities (bsc#1111666).\n- brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n- brcmfmac: sdio: Fix OOB interrupt initialization on brcm43362 (bsc#1111666).\n- brcmfmac: set F2 watermark to 256 for 4373 (bsc#1111666).\n- brcmfmac: set SDIO F1 MesBusyCtrl for CYW4373 (bsc#1111666).\n- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).\n- brcmsmac: Use kvmalloc() for ucode allocations (bsc#1111666).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can, slip: Protect tty->disc_data in write_wakeup and close with RCU (bsc#1051510).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: peak_usb: report bus recovery as well (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix deadlocks in autodisconnect work (bsc#1111666).\n- cfg80211: fix memory leak in cfg80211_cqm_rssi_update (bsc#1111666).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n- cfg80211: validate wmm rule when setting (bsc#1111666).\n- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).\n- cgroup: pids: use atomic64_t for pids->limit (bsc#1161514).\n- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n- cifs: add support for flock (bsc#1144333).\n- cifs: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n- cifs: Close cached root handle only if it had a lease (bsc#1144333).\n- cifs: Close open handle after interrupted close (bsc#1144333).\n- cifs: close the shared root handle on tree disconnect (bsc#1144333).\n- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n- cifs: Do not miss cancelled OPEN responses (bsc#1144333).\n- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n- cifs: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- cifs: fix max ea value size (bsc#1144333, bsc#1154355).\n- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n- cifs: Fix mount options set in automount (bsc#1144333).\n- cifs: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- cifs: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- cifs: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- cifs: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n- cifs: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n- cifs: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- cifs: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n- cifs: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n- cifs: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n- cifs: Properly process SMB3 lease breaks (bsc#1144333).\n- cifs: remove set but not used variables 'cinode' and 'netfid' (bsc#1144333).\n- cifs: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n- cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: imx: clk-composite-8m: add lock to gate/mux (git-fixes).\n- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- configfs_register_group() shouldn't be (and isn't) called in rmdirable parts (bsc#1051510).\n- copy/pasted 'Recommends:' instead of 'Provides:', 'Obsoletes:' and 'Conflicts:\n- Cover up kABI breakage due to DH key verification (bsc#1155331).\n- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).\n- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n- cpupower: Fix coredump on VMWare (bsc#1051510).\n- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn->alg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: caam/qi2 - fix typo in algorithm's driver name (bsc#1111666).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n- crypto: dh - add public key verification test (bsc#1155331).\n- crypto: dh - fix calculating encoded key size (bsc#1155331).\n- crypto: dh - fix memory leak (bsc#1155331).\n- crypto: dh - update test for public key verification (bsc#1155331).\n- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n- crypto: ecdh - add public key verification test (bsc#1155331).\n- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).\n- crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127354 bsc#1127371).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n- dlm: do not leak kernel pointer to userspace (bsc#1051510).\n- dlm: fix invalid free (bsc#1051510).\n- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n- docs: move protection-keys.rst to the core-api book (bsc#1078248).\n- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).\n- drivers/regulator: fix a missing check of return value (bsc#1051510).\n- drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported (bsc#1113956)\n- drm/amd/powerplay: remove set but not used variable 'us_mvdd' (bsc#1111666).\n- drm/amdgpu/{uvd,vcn}: fetch ring's read_ptr after alloc (bsc#1111666).\n- drm/amdgpu: add function parameter description in 'amdgpu_device_set_cg_state' (bsc#1111666).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1111666).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)\n- drm/amdgpu: fix ring test failure issue during s3 in vce 3.0 (V2) (bsc#1111666).\n- drm/amdgpu: remove set but not used variable 'invalid' (bsc#1111666).\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915/gvt: fix dropping obj reference twice (bsc#1111666).\n- drm/i915/gvt: Pin vgpu dma address before using (bsc#1112178)\n- drm/i915/gvt: set guest display buffer as readonly (bsc#1112178)\n- drm/i915/gvt: use vgpu lock for active state setting (bsc#1112178)\n- drm/i915/perf: add missing delay for OA muxes configuration (bsc#1111666).\n- drm/i915/pmu: 'Frequency' is reported as accumulated cycles (bsc#1112178)\n- drm/i915: Add missing include file <linux/math64.h> (bsc#1051510).\n- drm/i915: Call dma_set_max_seg_size() in i915_driver_hw_probe() (bsc#1111666).\n- drm/i915: Do not dereference request if it may have been retired when (bsc#1142635)\n- drm/i915: Fix and improve MCR selection logic (bsc#1112178)\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm/i915: Handle vm_mmap error during I915_GEM_MMAP ioctl with WC set (bsc#1111666).\n- drm/i915: Lock the engine while dumping the active request (bsc#1142635)\n- drm/i915: Make sure cdclk is high enough for DP audio on VLV/CHV (bsc#1111666).\n- drm/i915: Reacquire priolist cache after dropping the engine lock (bsc#1129770)\n- drm/i915: Reacquire priolist cache after dropping the engine lock (bsc#1129770)\n- drm/i915: Sanity check mmap length against object size (bsc#1111666).\n- drm/i915: Skip modeset for cdclk changes if possible (bsc#1156928).\n- drm/msm: fix memleak on release (bsc#1111666).\n- drm/msm: include linux/sched/task.h (bsc#1112178)\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/nouveau/bar/gf100: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/bar/nv50: check bar1 vmm return value (bsc#1111666).\n- drm/nouveau/mmu: qualify vmm during dtor (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- drm/rect: Avoid division by zero (bsc#1111666).\n- drm/rect: update kerneldoc for drm_rect_clip_scaled() (bsc#1111666).\n- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)\n- drm/sun4i: hdmi: Remove duplicate cleanup calls (bsc#1113956)\n- drm/sun4i: tcon: Set min division of TCON0_DCLK to 1 (bsc#1111666).\n- drm/sun4i: tcon: Set RGB DCLK min. divider based on hardware model (bsc#1111666).\n- drm/ttm: ttm_tt_init_fields() can be static (bsc#1111666).\n- drm: fix module name in edid_firmware log message (bsc#1113956)\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n- drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable (bsc#1111666).\n- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)\n- e1000e: Add support for Comet Lake (bsc#1158533).\n- e1000e: Add support for Tiger Lake (bsc#1158533).\n- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n- e1000e: Increase pause and refresh time (bsc#1158533).\n- e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n- e100: Fix passing zero to 'PTR_ERR' warning in e100_load_ucode_wait (bsc#1051510).\n- ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable (bsc#1158646).\n- ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either (bsc#1158647).\n- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- ext4: fix punch hole for inline_data file systems (bsc#1158640).\n- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n- firestream: fix memory leaks (bsc#1051510).\n- Fix partial checked out tree build ... so that bisection does not break.\n- Fix the locking in dcache_readdir() and friends (bsc#1123328).\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).\n- HID: Fix assumption that devices have inputs (git-fixes).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).\n- hypfs: Fix error number left in struct pointer member (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- i2c: of: Try to find an I2C adapter matching the parent (bsc#1129770)\n- i40e: enable X710 support (bsc#1151067).\n- IB/hfi1: Do not cancel unused work item (bsc#1114685 ).\n- IB/mlx5: Fix steering rule of drop and count (bsc#1103991 ).\n- IB/mlx5: Free mpi in mp_slave mode (bsc#1103991).\n- IB/mlx5: Remove dead code (bsc#1103991).\n- IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command (bsc#1103991).\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ice: fix potential infinite loop because loop counter being too small (bsc#1118661).\n- ice: fix stack leakage (bsc#1118661).\n- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- intel_th: Fix a double put_device() in error path (git-fixes).\n- iomap: Fix pipe page leakage during splicing (bsc#1158651).\n- iommu/iova: Init the struct iova to fix the possible memleak (bsc#1160469).\n- iommu/mediatek: Correct the flush_iotlb_all callback (bsc#1160470).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- ipmi: Do not allow device module unload when in use (bsc#1154768).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).\n- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).\n- irqdomain: Add the missing assignment of domain->fwnode for named fwnode (bsc#1111666).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: change monitor DMA to be coherent (bsc#1161243).\n- iwlwifi: check kasprintf() return value (bsc#1051510).\n- iwlwifi: clear persistence bit according to device family (bsc#1111666).\n- iwlwifi: drop packets with bad status in CD (bsc#1111666).\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n- iwlwifi: mvm: force TCM re-evaluation on TCM resume (bsc#1111666).\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- iwlwifi: mvm: use correct FIFO length (bsc#1111666).\n- iwlwifi: pcie: fit reclaim msg to MAX_MSG_LEN (bsc#1111666).\n- iwlwifi: pcie: fix erroneous print (bsc#1111666).\n- iwlwifi: pcie: read correct prph address for newer devices (bsc#1111666).\n- iwlwifi: trans: Clear persistence bit when starting the FW (bsc#1111666).\n- ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 ).\n- ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 ).\n- kABI fix for 'ipmi: Do not allow device module unload when in use' (bsc#1154768).\n- kABI fixup alloc_dax_region (bsc#1158071).\n- kABI fixup for alloc_dax_region (bsc#1158071,bsc#1160678).\n- kABI workaround for ath10k hw_filter_reset_required field (bsc#1111666).\n- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kABI workaround for iwlwifi iwl_rx_cmd_buffer change (bsc#1111666).\n- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n- kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n- kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).\n- kABI: protect struct sctp_ep_common (kabi).\n- kABI: Protest new fields in BPF structs (bsc#1160618).\n- kABI: s390: struct subchannel (git-fixes).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n- kexec: bail out upon SIGKILL when allocating memory (git-fixes).\n- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).\n- KVM: s390: fix __insn32_query() inline assembly (git-fixes).\n- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).\n- KVM: s390: vsie: Do not shadow CRYCB when no AP and no keys (git-fixes).\n- KVM: s390: vsie: Return correct values for Invalid CRYCB format (git-fixes).\n- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n- kvm: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).\n- KVM: x86: Remove a spurious export of a static function (bsc#1158954).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- libnvdimm/namespace: Differentiate between probe mapping and runtime mapping (bsc#1153535).\n- libnvdimm/pfn: Account for PAGE_SIZE > info-block-size in nd_pfn_init() (bsc#1127682 bsc#1153535 ltc#175033 ltc#181834).\n- libnvdimm: Export the target_node attribute for regions and namespaces (bsc#1158071).\n- libnvdimm: Fix devm_nsio_enable() kabi (bsc#1153535).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n- livepatch: Basic API to track system state changes (bsc#1071995 ).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n- loop: add ioctl for changing logical block size (bsc#1108043).\n- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n- lpfc: size cpu map by last cpu id set (bsc#1157160).\n- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- mac80211: fix ieee80211_txq_setup_flows() failure path (bsc#1111666).\n- mac80211: fix station inactive_time shortly after boot (bsc#1051510).\n- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: schedule bc_work even if error (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).\n- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: bdisp: fix memleak on release (git-fixes).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n- media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n- media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n- media: ov6650: Fix control handler not freed on init error (git-fixes).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).\n- media: radio: wl1273: fix interrupt masking on release (git-fixes).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n- media: uvcvideo: Fix error path in control parsing failure (git-fixes).\n- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: vim2m: Fix abort issue (git-fixes).\n- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n- mei: bus: prefix device names on bus with the bus name (bsc#1051510).\n- mei: fix modalias documentation (git-fixes).\n- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b ('rpm/kernel-subpackage-spec: Unify dependency handling.') Fixes: 3fd22e219f77 ('rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)')\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n- mlxsw: spectrum_flower: Fail in case user specifies multiple mirror actions (bsc#1112374).\n- mlxsw: spectrum_qdisc: Ignore grafting of invisible FIFO (bsc#1112374).\n- mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel (bsc#1112374).\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).\n- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).\n- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mmc: core: fix wl1251 sdio quirks (git-fixes).\n- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: Revert 'mmc: sdhci-of-esdhc: add erratum A-009204 support' (bsc#1051510).\n- mmc: sdhci: Add a quirk for broken command queuing (git-fixes).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK (git-fixes).\n- mmc: sdio: fix wl1251 vendor id (git-fixes).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- moduleparam: fix parameter description mismatch (bsc#1051510).\n- mqprio: Fix out-of-bounds access in mqprio_dump (bsc#1109837).\n- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n- mt76x0: init hw capabilities.\n- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n- mwifex: free rx_cmd skb in suspended state (bsc#1111666).\n- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).\n- mwifiex: delete unused mwifiex_get_intf_num() (bsc#1111666).\n- mwifiex: do no submit URB in suspended state (bsc#1111666).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).\n- mwifiex: update set_mac_address logic (bsc#1111666).\n- nbd: prevent memory leak (bsc#1158638).\n- net, sysctl: Fix compiler warning when only cBPF is present (bsc#1109837).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx4_en: Fix wrong limitation for number of TX rings (bsc#1103989).\n- net/mlx5: Accumulate levels for chains prio namespaces (bsc#1103990).\n- net/mlx5: FWTrace, Reduce stack usage (bsc#1103990).\n- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n- net/mlx5: Update the list of the PCI supported devices (bsc#1127611).\n- net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 ).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 ).\n- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n- net/mlx5e: Print a warning when LRO feature is dropped or not allowed (bsc#1103990).\n- net/mlx5e: Query global pause state before setting prio2buffer (bsc#1103990).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net/sched: cbs: Fix not adding cbs instance to list (bsc#1109837).\n- net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate (bsc#1109837).\n- net/smc: avoid fallback in case of non-blocking connect (git-fixes).\n- net/smc: do not schedule tx_work in SMC_CLOSED state (git-fixes).\n- net/smc: fix closing of fallback SMC sockets (git-fixes).\n- net/smc: Fix error path in smc_init (git-fixes).\n- net/smc: fix ethernet interface refcounting (git-fixes).\n- net/smc: fix fastopen for non-blocking connect() (git-fixes).\n- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).\n- net/smc: fix refcounting for non-blocking connect() (git-fixes).\n- net/smc: fix SMCD link group creation with VLAN id (git-fixes).\n- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).\n- net/smc: original socket family in inet_sock_diag (git-fixes).\n- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).\n- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n- net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).\n- net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).\n- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n- net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n- net: dsa: fix switch tree list (networking-stable-19_11_05).\n- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n- net: hns3: change GFP flag during lock period (bsc#1104353 ).\n- net: hns3: do not query unsupported commands in debugfs (bsc#1104353).\n- net: hns3: fix ETS bandwidth validation bug (bsc#1104353 ).\n- net: hns3: fix GFP flag error in hclge_mac_update_stats() (bsc#1126390).\n- net: hns3: fix some reset handshake issue (bsc#1104353 ).\n- net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353 bsc#1134983).\n- net: hns: Fix the stray netpoll locks causing deadlock in NAPI path (bsc#1104353).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).\n- net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 ).\n- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: Check against net_device being NULL (bsc#1051510).\n- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).\n- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).\n- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).\n- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).\n- net: phy: marvell: clear wol event before setting it (bsc#1051510).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: meson-gxl: check phy_write return value (bsc#1051510).\n- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: mscc: read 'vsc8531, edge-slowdown' as an u32 (bsc#1051510).\n- net: phy: mscc: read 'vsc8531,vddmac' as an u32 (bsc#1051510).\n- net: phy: xgene: disable clk on error paths (bsc#1051510).\n- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).\n- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).\n- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).\n- net: phylink: Fix flow control resolution (bsc#1119113 ).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net: sched: cbs: Avoid division by zero when calculating the port rate (bsc#1109837).\n- net: sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key (bsc#1109837).\n- net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues (bsc#1109837).\n- net: sched: fix possible crash in tcf_action_destroy() (bsc#1109837).\n- net: sched: fix reordering issues (bsc#1109837).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net: sock_map, fix missing ulp check in sock hash case (bsc#1109837).\n- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n- nfc: fdp: fix incorrect free object (networking-stable-19_11_10).\n- nfc: netlink: fix double device reference drop (git-fixes).\n- nfc: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- nfc: pn533: fix bulk-message timeout (bsc#1051510).\n- nfc: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- nfc: port100: handle command failure cleanly (git-fixes).\n- nfc: st21nfca: fix double free (networking-stable-19_11_10).\n- nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs (bsc#1109837).\n- nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs (bsc#1109837).\n- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n- nvme-tcp: support C2HData with SUCCESS flag (bsc#1157386).\n- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n- ocfs2: fix passing zero to 'PTR_ERR' warning (bsc#1158649).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: fix flow command message size (git-fixes).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).\n- PCI/PM: Clear PCIe PME Status even for legacy power management (bsc#1111666).\n- PCI/PME: Fix possible use-after-free on remove (git-fixes).\n- PCI/PTM: Remove spurious 'd' from granularity message (bsc#1051510).\n- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n- PCI: pciehp: Avoid returning prematurely from sysfs requests (git-fixes).\n- PCI: pciehp: Do not disable interrupt twice on suspend (bsc#1111666).\n- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n- PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30 (git-fixes).\n- perf/x86/amd: Change/fix NMI latency mitigation to use a timestamp (bsc#1142924).\n- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: cherryview: Fix irq_valid_mask calculation (bsc#1111666).\n- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).\n- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).\n- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n- PM / devfreq: passive: fix compiler warning (bsc#1051510).\n- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).\n- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n- powerpc/bpf: Fix tail call implementation (bsc#1157698).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/papr_scm: Do not enable direct map for a region by default (bsc#1129551).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/pseries/lparcfg: Fix display of Maximum Memory (bsc#1162028 ltc#181740).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n- powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init() (git-fixes).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges >4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges >4GB (bnc#1151927 5.3.17).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- printk: Export console_printk (bsc#1071995).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- pwm: Clear chip_data in pwm_put() (bsc#1051510).\n- pwm: clps711x: Fix period calculation (bsc#1051510).\n- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).\n- qxl: fix null-pointer crash during suspend (bsc#1111666).\n- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- random: move FIPS continuous test to output functions (bsc#1155334).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- RDMA/bnxt_re: Enable SRIOV VF support on Broadcom's 57500 adapter series (bsc#1154916).\n- RDMA/bnxt_re: Fix chip number validation Broadcom's Gen P5 series (bsc#1157895).\n- RDMA/bnxt_re: Fix missing le16_to_cpu (bsc#1157895).\n- RDMA/bnxt_re: Fix stat push into dma buffer on gen p5 devices (bsc#1157115)\n- RDMA/efa: Clear the admin command buffer prior to its submission (git-fixes) This change was already picked through Amazon driver repo but was not marked with a Git-commit tag.\n- RDMA/hns: Bugfix for qpc/cqc timer configuration (bsc#1104427 bsc#1126206).\n- RDMA/hns: Correct the value of srq_desc_size (bsc#1104427 ).\n- RDMA/hns: Fix comparison of unsigned long variable 'end' with less than zero (bsc#1104427 bsc#1137236).\n- RDMA/hns: Fix to support 64K page for srq (bsc#1104427 ).\n- RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 ).\n- RDMA/hns: Prevent memory leaks of eq->buf_list (bsc#1104427 ).\n- README.BRANCH: Removing myself from the maintainer list\n- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- regulator: tps65910: fix a missing check of return value (bsc#1051510).\n- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).\n- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_ops kerneldoc comment (bsc#1051510).\n- resource: fix locking in find_next_iomem_res() (bsc#1114279).\n- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages\n- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n- rpm/kernel-subpackage-spec: fix kernel-default-base build There were some issues with recent changes to subpackage dependencies handling:\n- rpm/kernel-subpackage-spec: Unify dependency handling.\n- rpm/modules.fips: update module list (bsc#1157853)\n- rsi_91x_usb: fix interface sanity check (git-fixes).\n- rt2800: remove errornous duplicate condition (git-fixes).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in 'max8997_rtc_read_alarm()' (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf's type to u8 in s35390a_init (bsc#1051510).\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtl818x: fix potential use after free (bsc#1051510).\n- rtl8xxxu: fix interface sanity check (git-fixes).\n- rtlwifi: btcoex: Use proper enumerated types for Wi-Fi only interface (bsc#1111666).\n- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing callback that tests for hw release of buffer (bsc#1111666).\n- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n- s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n- s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n- s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n- s390/cio: fix virtio-ccw DMA without PV (git-fixes).\n- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n- s390/idle: fix cpu idle time calculation (bsc#1051510).\n- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n- s390/process: avoid potential reading of freed stack (bsc#1051510).\n- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n- s390/qeth: clean up page frag creation (git-fixes).\n- s390/qeth: consolidate skb allocation (git-fixes).\n- s390/qeth: ensure linear access to packet headers (git-fixes).\n- s390/qeth: guard against runt packets (git-fixes).\n- s390/qeth: return proper errno on IO error (bsc#1051510).\n- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n- s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n- s390/zcrypt: fix memleak at release (git-fixes).\n- s390: fix stfle zero padding (bsc#1051510).\n- s390: vsie: Use effective CRYCBD.31 to check CRYCBD validity (git-fixes).\n- sched/fair: Add tmp_alone_branch assertion (bnc#1156462).\n- sched/fair: Fix insertion in rq->leaf_cfs_rq_list (bnc#1156462).\n- sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).\n- sched/fair: Optimize update_blocked_averages() (bnc#1156462).\n- sched/fair: WARN() and refuse to set buddy when !se->on_rq (bsc#1158132).\n- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1154601).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n- scsi: lpfc: use hdwq assigned cpu for allocation (bsc#1157160).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Correctly retrieve and interpret active flash region (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use correct number of vectors for online CPUs (bsc#1137223).\n- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n- scsi: zfcp: trace channel log even for FCP command responses (git-fixes).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: max310x: Fix tx_empty() callback (bsc#1051510).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- sfc: Remove 'PCIE error reporting unavailable' (bsc#1161472).\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: Fix use-after-free Read in slip_open (bsc#1051510).\n- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).\n- smb3: Fix persistent handles reconnect (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1144333).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- spi: atmel: Fix CS high support (bsc#1051510).\n- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#1051510).\n- spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch (bsc#1051510).\n- spi: omap2-mcspi: Set FIFO DMA trigger level to word length (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n- spi: spidev: Fix OF tree warning logic (bsc#1051510).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: rtl8192e: fix potential use after free (bsc#1051510).\n- staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids (bsc#1051510).\n- staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- stm class: Fix a double free of stm_source_device (bsc#1051510).\n- supported.conf:\n- synclink_gt(): fix compat_ioctl() (bsc#1051510).\n- tcp: clear tp->packets_out when purging write queue (bsc#1160560).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n- thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).\n- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: check msg->req data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n- tipc: compat: allow tipc commands without arguments (bsc#1051510).\n- tipc: fix a missing check of genlmsg_put (bsc#1051510).\n- tipc: fix link name length check (bsc#1051510).\n- tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).\n- tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).\n- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n- tipc: handle the err returned from cmd header function (bsc#1051510).\n- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n- tipc: tipc clang warning (bsc#1051510).\n- tools/power/x86/intel-speed-select: Fix a read overflow in isst_set_tdp_level_msr() (bsc#1111666).\n- tools: bpftool: fix arguments for p_err() in do_event_pipe() (bsc#1109837).\n- tpm: add check after commands attribs tab allocation (bsc#1051510).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: msm_serial: Fix flow control (bsc#1051510).\n- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n- tun: fix data-race in gro_normal_list() (bsc#1111666).\n- uaccess: Add non-pagefault user-space write function (bsc#1083647).\n- ubifs: Correctly initialize c->min_log_bytes (bsc#1158641).\n- ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n- usb: adutux: fix interface sanity check (bsc#1051510).\n- usb: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- usb: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- usb: chaoskey: fix error case of a timeout (git-fixes).\n- usb: chipidea: Fix otg event handler (bsc#1051510).\n- usb: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- usb: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- usb: core: urb: fix URB structure initialization function (bsc#1051510).\n- usb: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- usb: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- usb: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- usb: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n- usb: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- usb: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).\n- usb: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- usb: gadget: pch_udc: fix use after free (bsc#1051510).\n- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- usb: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- usb: idmouse: fix interface sanity checks (bsc#1051510).\n- usb: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n- usb: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n- usb: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- usb: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- usb: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- usb: roles: fix a potential use after free (git-fixes).\n- usb: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).\n- usb: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- usb: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n- usb: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- usb: serial: io_edgeport: use irqsave() in USB's complete callback (bsc#1051510).\n- usb: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- usb: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- usb: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- usb: serial: keyspan: handle unbound ports (bsc#1051510).\n- usb: serial: mos7720: fix remote wakeup (git-fixes).\n- usb: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n- usb: serial: mos7840: fix remote wakeup (git-fixes).\n- usb: serial: opticon: fix control-message timeouts (bsc#1051510).\n- usb: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n- usb: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n- usb: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- usb: serial: quatech2: handle unbound ports (bsc#1051510).\n- usb: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- usb: serial: suppress driver bind attributes (bsc#1051510).\n- usb: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- usb: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- usb: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- usb: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- usb: xhci: only set D3hot for pci device (bsc#1051510).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n- vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1 (bsc#1051510).\n- video/hdmi: Fix AVI bar unpack (git-fixes).\n- video: backlight: Add devres versions of of_find_backlight (bsc#1090888) Taken for 6010831dde5.\n- video: backlight: Add of_find_backlight helper in backlight.c (bsc#1090888) Taken for 6010831dde5.\n- virtio/s390: fix race on airq_areas (bsc#1051510).\n- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n- virtio_ring: fix return code on DMA mapping fails (git-fixes).\n- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n- watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n- watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).\n- wil6210: drop Rx multicast packets that are looped-back to STA (bsc#1111666).\n- wil6210: fix debugfs memory access alignment (bsc#1111666).\n- wil6210: fix invalid memory access for rx_buff_mgmt debugfs (bsc#1111666).\n- wil6210: fix L2 RX status handling (bsc#1111666).\n- wil6210: fix locking in wmi_call (bsc#1111666).\n- wil6210: fix RGF_CAF_ICR address for Talyn-MB (bsc#1111666).\n- wil6210: prevent usage of tx ring 0 for eDMA (bsc#1111666).\n- wil6210: set edma variables only for Talyn-MB devices (bsc#1111666).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n- x86/pkeys: Update documentation about availability (bsc#1078248).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n- xsk: Fix registration of Rx-only sockets (bsc#1109837).\n- xsk: relax UMEM headroom alignment (bsc#1109837).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2020-613,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-613,SUSE-SLE-Module-RT-15-SP1-2020-613", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0613-1.json", }, { category: "self", summary: "URL for SUSE-SU-2020:0613-1", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200613-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2020:0613-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html", }, { category: "self", summary: "SUSE Bug 1046303", url: "https://bugzilla.suse.com/1046303", }, { category: "self", summary: "SUSE Bug 1050244", url: "https://bugzilla.suse.com/1050244", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1051858", url: "https://bugzilla.suse.com/1051858", }, { category: "self", summary: "SUSE Bug 1061840", url: "https://bugzilla.suse.com/1061840", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1083647", url: "https://bugzilla.suse.com/1083647", }, { category: "self", summary: "SUSE Bug 1085030", url: "https://bugzilla.suse.com/1085030", }, { category: "self", summary: "SUSE Bug 1086301", url: "https://bugzilla.suse.com/1086301", }, { category: "self", summary: "SUSE Bug 1086313", url: "https://bugzilla.suse.com/1086313", }, { category: "self", summary: "SUSE Bug 1086314", url: "https://bugzilla.suse.com/1086314", }, { category: "self", summary: "SUSE Bug 1089644", url: "https://bugzilla.suse.com/1089644", }, { category: "self", summary: "SUSE Bug 1090888", url: "https://bugzilla.suse.com/1090888", }, { category: "self", summary: "SUSE Bug 1103989", url: "https://bugzilla.suse.com/1103989", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103991", url: "https://bugzilla.suse.com/1103991", }, { category: "self", summary: "SUSE Bug 1104353", url: "https://bugzilla.suse.com/1104353", }, { category: "self", summary: "SUSE Bug 1104427", url: "https://bugzilla.suse.com/1104427", }, { category: "self", summary: "SUSE Bug 1104745", url: "https://bugzilla.suse.com/1104745", }, { category: "self", summary: "SUSE Bug 1108043", url: "https://bugzilla.suse.com/1108043", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1111666", url: "https://bugzilla.suse.com/1111666", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1113956", url: "https://bugzilla.suse.com/1113956", }, { category: "self", summary: "SUSE Bug 1113994", url: "https://bugzilla.suse.com/1113994", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1114685", url: "https://bugzilla.suse.com/1114685", }, { category: "self", summary: "SUSE Bug 1115026", url: "https://bugzilla.suse.com/1115026", }, { category: "self", summary: "SUSE Bug 1117169", url: "https://bugzilla.suse.com/1117169", }, { category: "self", summary: "SUSE Bug 1118661", url: "https://bugzilla.suse.com/1118661", }, { category: "self", summary: "SUSE Bug 1119113", url: "https://bugzilla.suse.com/1119113", }, { category: "self", summary: "SUSE Bug 1120853", url: "https://bugzilla.suse.com/1120853", }, { category: "self", summary: "SUSE Bug 1123328", url: "https://bugzilla.suse.com/1123328", }, { category: "self", summary: "SUSE Bug 1126206", url: "https://bugzilla.suse.com/1126206", }, { category: "self", summary: "SUSE Bug 1126390", url: "https://bugzilla.suse.com/1126390", }, { category: "self", summary: "SUSE Bug 1127354", url: "https://bugzilla.suse.com/1127354", }, { category: "self", summary: "SUSE Bug 1127371", url: "https://bugzilla.suse.com/1127371", }, { category: "self", summary: "SUSE Bug 1127611", url: "https://bugzilla.suse.com/1127611", }, { category: "self", summary: "SUSE Bug 1127682", url: "https://bugzilla.suse.com/1127682", }, { category: "self", summary: "SUSE Bug 1129551", url: "https://bugzilla.suse.com/1129551", }, { category: "self", summary: "SUSE Bug 1129770", url: "https://bugzilla.suse.com/1129770", }, { category: "self", summary: "SUSE Bug 1134973", url: "https://bugzilla.suse.com/1134973", }, { category: "self", summary: "SUSE Bug 1134983", url: "https://bugzilla.suse.com/1134983", }, { category: "self", summary: "SUSE Bug 1137223", url: "https://bugzilla.suse.com/1137223", }, { category: "self", summary: "SUSE Bug 1137236", url: "https://bugzilla.suse.com/1137236", }, { category: "self", summary: "SUSE Bug 1138039", url: "https://bugzilla.suse.com/1138039", }, { category: "self", summary: "SUSE Bug 1140948", url: "https://bugzilla.suse.com/1140948", }, { category: "self", summary: "SUSE Bug 1141054", url: "https://bugzilla.suse.com/1141054", }, { category: "self", summary: "SUSE Bug 1142095", url: "https://bugzilla.suse.com/1142095", }, { category: "self", summary: "SUSE Bug 1142635", url: "https://bugzilla.suse.com/1142635", }, { category: "self", summary: "SUSE Bug 1142924", url: "https://bugzilla.suse.com/1142924", }, { category: "self", summary: "SUSE Bug 1143959", url: "https://bugzilla.suse.com/1143959", }, { category: "self", summary: "SUSE Bug 1144333", url: "https://bugzilla.suse.com/1144333", }, { category: "self", summary: "SUSE Bug 1146519", url: "https://bugzilla.suse.com/1146519", }, { category: "self", summary: "SUSE Bug 1146544", url: "https://bugzilla.suse.com/1146544", }, { category: "self", summary: "SUSE Bug 1151067", url: "https://bugzilla.suse.com/1151067", }, { category: "self", summary: "SUSE Bug 1151548", url: "https://bugzilla.suse.com/1151548", }, { category: "self", summary: "SUSE Bug 1151900", url: "https://bugzilla.suse.com/1151900", }, { category: "self", summary: "SUSE Bug 1151910", url: "https://bugzilla.suse.com/1151910", }, { category: "self", summary: "SUSE Bug 1151927", url: "https://bugzilla.suse.com/1151927", }, { category: "self", summary: "SUSE Bug 1152107", url: "https://bugzilla.suse.com/1152107", }, { category: "self", summary: "SUSE Bug 1152631", url: "https://bugzilla.suse.com/1152631", }, { category: "self", summary: "SUSE Bug 1153535", url: "https://bugzilla.suse.com/1153535", }, { category: "self", summary: "SUSE Bug 1153628", url: "https://bugzilla.suse.com/1153628", }, { category: "self", summary: "SUSE Bug 1153811", url: "https://bugzilla.suse.com/1153811", }, { category: "self", summary: "SUSE Bug 1153917", url: "https://bugzilla.suse.com/1153917", }, { category: "self", summary: "SUSE Bug 1154043", url: "https://bugzilla.suse.com/1154043", }, { category: "self", summary: "SUSE Bug 1154058", url: "https://bugzilla.suse.com/1154058", }, { category: "self", summary: "SUSE Bug 1154243", url: "https://bugzilla.suse.com/1154243", }, { category: "self", summary: "SUSE Bug 1154355", url: "https://bugzilla.suse.com/1154355", }, { category: "self", summary: "SUSE Bug 1154601", url: "https://bugzilla.suse.com/1154601", }, { category: "self", summary: "SUSE Bug 1154768", url: "https://bugzilla.suse.com/1154768", }, { category: "self", summary: "SUSE Bug 1154916", url: "https://bugzilla.suse.com/1154916", }, { category: "self", summary: "SUSE Bug 1155331", url: "https://bugzilla.suse.com/1155331", }, { category: "self", summary: "SUSE Bug 1155334", url: "https://bugzilla.suse.com/1155334", }, { category: "self", summary: "SUSE Bug 1155689", url: "https://bugzilla.suse.com/1155689", }, { category: "self", summary: "SUSE Bug 1155897", url: "https://bugzilla.suse.com/1155897", }, { category: "self", summary: "SUSE Bug 1155921", url: "https://bugzilla.suse.com/1155921", }, { category: "self", summary: "SUSE Bug 1156258", url: "https://bugzilla.suse.com/1156258", }, { category: "self", summary: "SUSE Bug 1156259", url: "https://bugzilla.suse.com/1156259", }, { category: "self", summary: "SUSE Bug 1156286", url: "https://bugzilla.suse.com/1156286", }, { category: "self", summary: "SUSE Bug 1156462", url: "https://bugzilla.suse.com/1156462", }, { category: "self", summary: "SUSE Bug 1156471", url: "https://bugzilla.suse.com/1156471", }, { category: "self", summary: "SUSE Bug 1156928", url: "https://bugzilla.suse.com/1156928", }, { category: "self", summary: "SUSE Bug 1157032", url: "https://bugzilla.suse.com/1157032", }, { category: "self", summary: "SUSE Bug 1157038", url: "https://bugzilla.suse.com/1157038", }, { category: "self", summary: "SUSE Bug 1157042", url: "https://bugzilla.suse.com/1157042", }, { category: "self", summary: "SUSE Bug 1157044", url: "https://bugzilla.suse.com/1157044", }, { category: "self", summary: "SUSE Bug 1157045", url: "https://bugzilla.suse.com/1157045", }, { category: "self", summary: "SUSE Bug 1157046", url: "https://bugzilla.suse.com/1157046", }, { category: "self", summary: "SUSE Bug 1157049", url: "https://bugzilla.suse.com/1157049", }, { category: "self", summary: "SUSE Bug 1157070", url: "https://bugzilla.suse.com/1157070", }, { category: "self", summary: "SUSE Bug 1157115", url: "https://bugzilla.suse.com/1157115", }, { category: "self", summary: "SUSE Bug 1157143", url: "https://bugzilla.suse.com/1157143", }, { category: "self", summary: "SUSE Bug 1157145", url: "https://bugzilla.suse.com/1157145", }, { category: "self", summary: "SUSE Bug 1157155", url: "https://bugzilla.suse.com/1157155", }, { category: "self", summary: "SUSE Bug 1157157", url: "https://bugzilla.suse.com/1157157", }, { category: "self", summary: "SUSE Bug 1157158", url: "https://bugzilla.suse.com/1157158", }, { category: "self", summary: "SUSE Bug 1157160", url: "https://bugzilla.suse.com/1157160", }, { category: "self", summary: "SUSE Bug 1157162", url: "https://bugzilla.suse.com/1157162", }, { category: "self", summary: "SUSE Bug 1157169", url: "https://bugzilla.suse.com/1157169", }, { category: "self", summary: "SUSE Bug 1157171", url: "https://bugzilla.suse.com/1157171", }, { category: "self", summary: "SUSE Bug 1157173", url: "https://bugzilla.suse.com/1157173", }, { category: "self", summary: "SUSE Bug 1157178", url: "https://bugzilla.suse.com/1157178", }, { category: "self", summary: "SUSE Bug 1157180", url: "https://bugzilla.suse.com/1157180", }, { category: "self", summary: "SUSE Bug 1157182", url: "https://bugzilla.suse.com/1157182", }, { category: "self", summary: "SUSE Bug 1157183", url: "https://bugzilla.suse.com/1157183", }, { category: "self", summary: "SUSE Bug 1157184", url: "https://bugzilla.suse.com/1157184", }, { category: "self", summary: "SUSE Bug 1157191", url: "https://bugzilla.suse.com/1157191", }, { category: "self", summary: "SUSE Bug 1157193", url: "https://bugzilla.suse.com/1157193", }, { category: "self", summary: "SUSE Bug 1157197", url: "https://bugzilla.suse.com/1157197", }, { category: "self", summary: "SUSE Bug 1157298", url: "https://bugzilla.suse.com/1157298", }, { category: "self", summary: "SUSE Bug 1157303", url: "https://bugzilla.suse.com/1157303", }, { category: "self", summary: "SUSE Bug 1157304", url: "https://bugzilla.suse.com/1157304", }, { category: "self", summary: "SUSE Bug 1157307", url: "https://bugzilla.suse.com/1157307", }, { category: "self", summary: "SUSE Bug 1157324", url: "https://bugzilla.suse.com/1157324", }, { category: "self", summary: "SUSE Bug 1157333", url: "https://bugzilla.suse.com/1157333", }, { category: "self", summary: "SUSE Bug 1157386", url: "https://bugzilla.suse.com/1157386", }, { category: "self", summary: "SUSE Bug 1157424", url: "https://bugzilla.suse.com/1157424", }, { category: "self", summary: "SUSE Bug 1157463", url: "https://bugzilla.suse.com/1157463", }, { category: "self", summary: "SUSE Bug 1157499", url: "https://bugzilla.suse.com/1157499", }, { category: "self", summary: "SUSE Bug 1157678", url: "https://bugzilla.suse.com/1157678", }, { category: "self", summary: "SUSE Bug 1157692", url: "https://bugzilla.suse.com/1157692", }, { category: "self", summary: "SUSE Bug 1157698", url: "https://bugzilla.suse.com/1157698", }, { category: "self", summary: "SUSE Bug 1157778", url: "https://bugzilla.suse.com/1157778", }, { category: "self", summary: "SUSE Bug 1157853", url: "https://bugzilla.suse.com/1157853", }, { category: "self", summary: "SUSE Bug 1157895", url: "https://bugzilla.suse.com/1157895", }, { category: "self", summary: "SUSE Bug 1157908", url: "https://bugzilla.suse.com/1157908", }, { category: "self", summary: "SUSE Bug 1158013", url: "https://bugzilla.suse.com/1158013", }, { category: "self", summary: "SUSE Bug 1158021", url: "https://bugzilla.suse.com/1158021", }, { category: "self", summary: "SUSE Bug 1158026", url: "https://bugzilla.suse.com/1158026", }, { category: "self", summary: "SUSE Bug 1158049", url: "https://bugzilla.suse.com/1158049", }, { category: "self", summary: "SUSE Bug 1158063", url: "https://bugzilla.suse.com/1158063", }, { category: "self", summary: "SUSE Bug 1158064", url: "https://bugzilla.suse.com/1158064", }, { category: "self", summary: "SUSE Bug 1158065", url: "https://bugzilla.suse.com/1158065", }, { category: "self", summary: "SUSE Bug 1158066", url: "https://bugzilla.suse.com/1158066", }, { category: "self", summary: "SUSE Bug 1158067", url: "https://bugzilla.suse.com/1158067", }, { category: "self", summary: "SUSE Bug 1158068", url: "https://bugzilla.suse.com/1158068", }, { category: "self", summary: "SUSE Bug 1158071", url: "https://bugzilla.suse.com/1158071", }, { category: "self", summary: "SUSE Bug 1158082", url: "https://bugzilla.suse.com/1158082", }, { category: "self", summary: "SUSE Bug 1158094", url: "https://bugzilla.suse.com/1158094", }, { category: "self", summary: "SUSE Bug 1158132", url: "https://bugzilla.suse.com/1158132", }, { category: "self", summary: "SUSE Bug 1158381", url: "https://bugzilla.suse.com/1158381", }, { category: "self", summary: "SUSE Bug 1158394", url: "https://bugzilla.suse.com/1158394", }, { category: "self", summary: "SUSE Bug 1158398", url: "https://bugzilla.suse.com/1158398", }, { category: "self", summary: "SUSE Bug 1158407", url: "https://bugzilla.suse.com/1158407", }, { category: "self", summary: "SUSE Bug 1158410", url: "https://bugzilla.suse.com/1158410", }, { category: "self", summary: "SUSE Bug 1158413", url: "https://bugzilla.suse.com/1158413", }, { category: "self", summary: "SUSE Bug 1158417", url: "https://bugzilla.suse.com/1158417", }, { category: "self", summary: "SUSE Bug 1158427", url: "https://bugzilla.suse.com/1158427", }, { category: "self", summary: "SUSE Bug 1158445", url: "https://bugzilla.suse.com/1158445", }, { category: "self", summary: "SUSE Bug 1158533", url: "https://bugzilla.suse.com/1158533", }, { category: "self", summary: "SUSE Bug 1158637", url: "https://bugzilla.suse.com/1158637", }, { category: "self", summary: "SUSE Bug 1158638", url: "https://bugzilla.suse.com/1158638", }, { category: "self", summary: "SUSE Bug 1158639", url: "https://bugzilla.suse.com/1158639", }, { category: "self", summary: "SUSE Bug 1158640", url: "https://bugzilla.suse.com/1158640", }, { category: "self", summary: "SUSE Bug 1158641", url: "https://bugzilla.suse.com/1158641", }, { category: "self", summary: "SUSE Bug 1158643", url: "https://bugzilla.suse.com/1158643", }, { category: "self", summary: "SUSE Bug 1158644", url: "https://bugzilla.suse.com/1158644", }, { category: "self", summary: "SUSE Bug 1158645", url: "https://bugzilla.suse.com/1158645", }, { category: "self", summary: "SUSE Bug 1158646", url: "https://bugzilla.suse.com/1158646", }, { category: "self", summary: "SUSE Bug 1158647", url: "https://bugzilla.suse.com/1158647", }, { category: "self", summary: "SUSE Bug 1158649", url: "https://bugzilla.suse.com/1158649", }, { category: "self", summary: "SUSE Bug 1158651", url: "https://bugzilla.suse.com/1158651", }, { category: "self", summary: "SUSE Bug 1158652", url: "https://bugzilla.suse.com/1158652", }, { category: "self", summary: "SUSE Bug 1158819", url: "https://bugzilla.suse.com/1158819", }, { category: "self", summary: "SUSE Bug 1158823", url: "https://bugzilla.suse.com/1158823", }, { category: "self", summary: "SUSE Bug 1158824", url: "https://bugzilla.suse.com/1158824", }, { category: "self", summary: "SUSE Bug 1158827", url: "https://bugzilla.suse.com/1158827", }, { category: "self", summary: "SUSE Bug 1158834", url: "https://bugzilla.suse.com/1158834", }, { category: "self", summary: "SUSE Bug 1158893", url: "https://bugzilla.suse.com/1158893", }, { category: "self", summary: "SUSE Bug 1158900", url: "https://bugzilla.suse.com/1158900", }, { category: "self", summary: "SUSE Bug 1158903", url: "https://bugzilla.suse.com/1158903", }, { category: "self", summary: "SUSE Bug 1158904", url: "https://bugzilla.suse.com/1158904", }, { category: "self", summary: "SUSE Bug 1158954", url: "https://bugzilla.suse.com/1158954", }, { category: "self", summary: "SUSE Bug 1159024", url: "https://bugzilla.suse.com/1159024", }, { category: "self", summary: "SUSE Bug 1159028", url: "https://bugzilla.suse.com/1159028", }, { category: "self", summary: "SUSE Bug 1159297", url: "https://bugzilla.suse.com/1159297", }, { category: "self", summary: "SUSE Bug 1159377", url: "https://bugzilla.suse.com/1159377", }, { category: "self", summary: "SUSE Bug 1159394", url: "https://bugzilla.suse.com/1159394", }, { category: "self", summary: "SUSE Bug 1159483", url: "https://bugzilla.suse.com/1159483", }, { category: "self", summary: "SUSE Bug 1159484", url: "https://bugzilla.suse.com/1159484", }, { category: "self", summary: "SUSE Bug 1159500", url: "https://bugzilla.suse.com/1159500", }, { category: "self", summary: "SUSE Bug 1159569", url: "https://bugzilla.suse.com/1159569", }, { category: "self", summary: "SUSE Bug 1159588", url: "https://bugzilla.suse.com/1159588", }, { category: "self", summary: "SUSE Bug 1159841", url: "https://bugzilla.suse.com/1159841", }, { category: "self", summary: "SUSE Bug 1159908", url: "https://bugzilla.suse.com/1159908", }, { category: "self", summary: "SUSE Bug 1159909", url: "https://bugzilla.suse.com/1159909", }, { category: "self", summary: "SUSE Bug 1159910", url: "https://bugzilla.suse.com/1159910", }, { category: "self", summary: "SUSE Bug 1159911", url: "https://bugzilla.suse.com/1159911", }, { category: "self", summary: "SUSE Bug 1159955", url: "https://bugzilla.suse.com/1159955", }, { category: "self", summary: "SUSE Bug 1160147", url: "https://bugzilla.suse.com/1160147", }, { category: "self", summary: "SUSE Bug 1160195", url: "https://bugzilla.suse.com/1160195", }, { category: "self", summary: "SUSE Bug 1160210", url: "https://bugzilla.suse.com/1160210", }, { category: "self", summary: "SUSE Bug 1160211", url: "https://bugzilla.suse.com/1160211", }, { category: "self", summary: "SUSE Bug 1160433", url: "https://bugzilla.suse.com/1160433", }, { category: "self", summary: "SUSE Bug 1160442", url: "https://bugzilla.suse.com/1160442", }, { category: "self", summary: "SUSE Bug 1160469", url: "https://bugzilla.suse.com/1160469", }, { category: "self", summary: "SUSE Bug 1160470", url: "https://bugzilla.suse.com/1160470", }, { category: "self", summary: "SUSE Bug 1160476", url: "https://bugzilla.suse.com/1160476", }, { category: "self", summary: "SUSE Bug 1160560", url: "https://bugzilla.suse.com/1160560", }, { category: "self", summary: "SUSE Bug 1160618", url: "https://bugzilla.suse.com/1160618", }, { category: "self", summary: "SUSE Bug 1160678", url: "https://bugzilla.suse.com/1160678", }, { category: "self", summary: "SUSE Bug 1160755", url: "https://bugzilla.suse.com/1160755", }, { category: "self", summary: "SUSE Bug 1160756", url: "https://bugzilla.suse.com/1160756", }, { category: "self", summary: "SUSE Bug 1160784", url: "https://bugzilla.suse.com/1160784", }, { category: "self", summary: "SUSE Bug 1160787", url: "https://bugzilla.suse.com/1160787", }, { category: "self", summary: "SUSE Bug 1160802", url: "https://bugzilla.suse.com/1160802", }, { category: "self", summary: "SUSE Bug 1160803", url: "https://bugzilla.suse.com/1160803", }, { category: "self", summary: "SUSE Bug 1160804", url: "https://bugzilla.suse.com/1160804", }, { category: "self", summary: "SUSE Bug 1160917", url: "https://bugzilla.suse.com/1160917", }, { category: "self", summary: "SUSE Bug 1160966", url: "https://bugzilla.suse.com/1160966", }, { category: "self", summary: "SUSE Bug 1161087", url: "https://bugzilla.suse.com/1161087", }, { category: "self", summary: "SUSE Bug 1161243", url: "https://bugzilla.suse.com/1161243", }, { category: "self", summary: "SUSE Bug 1161472", url: "https://bugzilla.suse.com/1161472", }, { category: "self", summary: "SUSE Bug 1161514", url: "https://bugzilla.suse.com/1161514", }, { category: "self", summary: "SUSE Bug 1161518", url: "https://bugzilla.suse.com/1161518", }, { category: "self", summary: "SUSE Bug 1161522", url: "https://bugzilla.suse.com/1161522", }, { category: "self", summary: "SUSE Bug 1161523", url: "https://bugzilla.suse.com/1161523", }, { category: "self", summary: "SUSE Bug 1161549", url: "https://bugzilla.suse.com/1161549", }, { category: "self", summary: "SUSE Bug 1161552", url: "https://bugzilla.suse.com/1161552", }, { category: "self", summary: "SUSE Bug 1161674", url: "https://bugzilla.suse.com/1161674", }, { category: "self", summary: "SUSE Bug 1161931", url: "https://bugzilla.suse.com/1161931", }, { category: "self", summary: "SUSE Bug 1161933", url: "https://bugzilla.suse.com/1161933", }, { category: "self", summary: "SUSE Bug 1161934", url: "https://bugzilla.suse.com/1161934", }, { category: "self", summary: "SUSE Bug 1161935", url: "https://bugzilla.suse.com/1161935", }, { category: "self", summary: "SUSE Bug 1161936", url: "https://bugzilla.suse.com/1161936", }, { category: "self", summary: "SUSE Bug 1161937", url: "https://bugzilla.suse.com/1161937", }, { category: "self", summary: "SUSE Bug 1162028", url: "https://bugzilla.suse.com/1162028", }, { category: "self", summary: "SUSE Bug 1162067", url: "https://bugzilla.suse.com/1162067", }, { category: "self", summary: "SUSE Bug 1162109", url: "https://bugzilla.suse.com/1162109", }, { category: "self", summary: "SUSE Bug 1162139", url: "https://bugzilla.suse.com/1162139", }, { category: "self", summary: "SUSE CVE CVE-2019-14615 page", url: "https://www.suse.com/security/cve/CVE-2019-14615/", }, { category: "self", summary: "SUSE CVE CVE-2019-14895 page", url: "https://www.suse.com/security/cve/CVE-2019-14895/", }, { category: "self", summary: "SUSE CVE CVE-2019-14896 page", url: "https://www.suse.com/security/cve/CVE-2019-14896/", }, { category: "self", summary: "SUSE CVE CVE-2019-14897 page", url: "https://www.suse.com/security/cve/CVE-2019-14897/", }, { category: "self", summary: "SUSE CVE CVE-2019-14901 page", url: "https://www.suse.com/security/cve/CVE-2019-14901/", }, { category: "self", summary: "SUSE CVE CVE-2019-15213 page", url: "https://www.suse.com/security/cve/CVE-2019-15213/", }, { category: "self", summary: "SUSE CVE CVE-2019-16746 page", url: "https://www.suse.com/security/cve/CVE-2019-16746/", }, { category: "self", summary: "SUSE CVE CVE-2019-16994 page", url: "https://www.suse.com/security/cve/CVE-2019-16994/", }, { category: "self", summary: "SUSE CVE CVE-2019-18660 page", url: "https://www.suse.com/security/cve/CVE-2019-18660/", }, { category: "self", summary: "SUSE CVE CVE-2019-18683 page", url: "https://www.suse.com/security/cve/CVE-2019-18683/", }, { category: "self", summary: "SUSE CVE CVE-2019-18808 page", url: "https://www.suse.com/security/cve/CVE-2019-18808/", }, { category: "self", summary: "SUSE CVE CVE-2019-18809 page", url: "https://www.suse.com/security/cve/CVE-2019-18809/", }, { category: "self", summary: "SUSE CVE CVE-2019-19036 page", url: "https://www.suse.com/security/cve/CVE-2019-19036/", }, { category: "self", summary: "SUSE CVE CVE-2019-19045 page", url: "https://www.suse.com/security/cve/CVE-2019-19045/", }, { category: "self", summary: "SUSE CVE CVE-2019-19046 page", url: "https://www.suse.com/security/cve/CVE-2019-19046/", }, { category: "self", summary: "SUSE CVE CVE-2019-19049 page", url: "https://www.suse.com/security/cve/CVE-2019-19049/", }, { category: "self", summary: "SUSE CVE CVE-2019-19051 page", url: "https://www.suse.com/security/cve/CVE-2019-19051/", }, { category: "self", summary: "SUSE CVE CVE-2019-19052 page", url: "https://www.suse.com/security/cve/CVE-2019-19052/", }, { category: "self", summary: "SUSE CVE CVE-2019-19054 page", url: "https://www.suse.com/security/cve/CVE-2019-19054/", }, { category: "self", summary: "SUSE CVE CVE-2019-19056 page", url: "https://www.suse.com/security/cve/CVE-2019-19056/", }, { category: "self", summary: "SUSE CVE CVE-2019-19057 page", url: "https://www.suse.com/security/cve/CVE-2019-19057/", }, { category: "self", summary: "SUSE CVE CVE-2019-19058 page", url: "https://www.suse.com/security/cve/CVE-2019-19058/", }, { category: "self", summary: "SUSE CVE CVE-2019-19060 page", url: "https://www.suse.com/security/cve/CVE-2019-19060/", }, { category: "self", summary: "SUSE CVE CVE-2019-19062 page", url: "https://www.suse.com/security/cve/CVE-2019-19062/", }, { category: "self", summary: "SUSE CVE CVE-2019-19063 page", url: "https://www.suse.com/security/cve/CVE-2019-19063/", }, { category: "self", summary: "SUSE CVE CVE-2019-19065 page", url: "https://www.suse.com/security/cve/CVE-2019-19065/", }, { category: "self", summary: "SUSE CVE CVE-2019-19066 page", url: "https://www.suse.com/security/cve/CVE-2019-19066/", }, { category: "self", summary: "SUSE CVE CVE-2019-19067 page", url: "https://www.suse.com/security/cve/CVE-2019-19067/", }, { category: "self", summary: "SUSE CVE CVE-2019-19068 page", url: "https://www.suse.com/security/cve/CVE-2019-19068/", }, { category: "self", summary: "SUSE CVE CVE-2019-19073 page", url: "https://www.suse.com/security/cve/CVE-2019-19073/", }, { category: "self", summary: "SUSE CVE CVE-2019-19074 page", url: "https://www.suse.com/security/cve/CVE-2019-19074/", }, { category: "self", summary: "SUSE CVE CVE-2019-19075 page", url: "https://www.suse.com/security/cve/CVE-2019-19075/", }, { category: "self", summary: "SUSE CVE CVE-2019-19077 page", url: "https://www.suse.com/security/cve/CVE-2019-19077/", }, { category: "self", summary: "SUSE CVE CVE-2019-19078 page", url: "https://www.suse.com/security/cve/CVE-2019-19078/", }, { category: "self", summary: "SUSE CVE CVE-2019-19080 page", url: "https://www.suse.com/security/cve/CVE-2019-19080/", }, { category: "self", summary: "SUSE CVE CVE-2019-19081 page", url: "https://www.suse.com/security/cve/CVE-2019-19081/", }, { category: "self", summary: "SUSE CVE CVE-2019-19082 page", url: "https://www.suse.com/security/cve/CVE-2019-19082/", }, { category: "self", summary: "SUSE CVE CVE-2019-19083 page", url: "https://www.suse.com/security/cve/CVE-2019-19083/", }, { category: "self", summary: "SUSE CVE CVE-2019-19227 page", url: "https://www.suse.com/security/cve/CVE-2019-19227/", }, { category: "self", summary: "SUSE CVE CVE-2019-19318 page", url: "https://www.suse.com/security/cve/CVE-2019-19318/", }, { category: "self", summary: "SUSE CVE CVE-2019-19319 page", url: "https://www.suse.com/security/cve/CVE-2019-19319/", }, { category: "self", summary: "SUSE CVE CVE-2019-19332 page", url: "https://www.suse.com/security/cve/CVE-2019-19332/", }, { category: "self", summary: "SUSE CVE CVE-2019-19338 page", url: "https://www.suse.com/security/cve/CVE-2019-19338/", }, { category: "self", summary: "SUSE CVE CVE-2019-19447 page", url: "https://www.suse.com/security/cve/CVE-2019-19447/", }, { category: "self", summary: "SUSE CVE CVE-2019-19523 page", url: "https://www.suse.com/security/cve/CVE-2019-19523/", }, { category: "self", summary: "SUSE CVE CVE-2019-19524 page", url: "https://www.suse.com/security/cve/CVE-2019-19524/", }, { category: "self", summary: "SUSE CVE CVE-2019-19525 page", url: "https://www.suse.com/security/cve/CVE-2019-19525/", }, { category: "self", summary: "SUSE CVE CVE-2019-19526 page", url: "https://www.suse.com/security/cve/CVE-2019-19526/", }, { category: "self", summary: "SUSE CVE CVE-2019-19527 page", url: "https://www.suse.com/security/cve/CVE-2019-19527/", }, { category: "self", summary: "SUSE CVE CVE-2019-19528 page", url: "https://www.suse.com/security/cve/CVE-2019-19528/", }, { category: "self", summary: "SUSE CVE CVE-2019-19529 page", url: "https://www.suse.com/security/cve/CVE-2019-19529/", }, { category: "self", summary: "SUSE CVE CVE-2019-19530 page", url: "https://www.suse.com/security/cve/CVE-2019-19530/", }, { category: "self", summary: "SUSE CVE CVE-2019-19531 page", url: "https://www.suse.com/security/cve/CVE-2019-19531/", }, { category: "self", summary: "SUSE CVE CVE-2019-19532 page", url: "https://www.suse.com/security/cve/CVE-2019-19532/", }, { category: "self", summary: "SUSE CVE CVE-2019-19533 page", url: "https://www.suse.com/security/cve/CVE-2019-19533/", }, { category: "self", summary: "SUSE CVE CVE-2019-19534 page", url: "https://www.suse.com/security/cve/CVE-2019-19534/", }, { category: "self", summary: "SUSE CVE CVE-2019-19535 page", url: "https://www.suse.com/security/cve/CVE-2019-19535/", }, { category: "self", summary: "SUSE CVE CVE-2019-19536 page", url: "https://www.suse.com/security/cve/CVE-2019-19536/", }, { category: "self", summary: "SUSE CVE CVE-2019-19537 page", url: "https://www.suse.com/security/cve/CVE-2019-19537/", }, { category: "self", summary: "SUSE CVE CVE-2019-19543 page", url: "https://www.suse.com/security/cve/CVE-2019-19543/", }, { category: "self", summary: "SUSE CVE CVE-2019-19767 page", url: "https://www.suse.com/security/cve/CVE-2019-19767/", }, { category: "self", summary: "SUSE CVE CVE-2019-19927 page", url: "https://www.suse.com/security/cve/CVE-2019-19927/", }, { category: "self", summary: "SUSE CVE CVE-2019-19965 page", url: "https://www.suse.com/security/cve/CVE-2019-19965/", }, { category: "self", summary: "SUSE CVE CVE-2019-19966 page", url: "https://www.suse.com/security/cve/CVE-2019-19966/", }, { category: "self", summary: "SUSE CVE CVE-2019-20054 page", url: "https://www.suse.com/security/cve/CVE-2019-20054/", }, { category: "self", summary: "SUSE CVE CVE-2019-20095 page", url: "https://www.suse.com/security/cve/CVE-2019-20095/", }, { category: "self", summary: "SUSE CVE CVE-2019-20096 page", url: "https://www.suse.com/security/cve/CVE-2019-20096/", }, { category: "self", summary: "SUSE CVE CVE-2020-7053 page", url: "https://www.suse.com/security/cve/CVE-2020-7053/", }, { category: "self", summary: "SUSE CVE CVE-2020-8428 page", url: "https://www.suse.com/security/cve/CVE-2020-8428/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2020-03-09T09:24:58Z", generator: { date: "2020-03-09T09:24:58Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2020:0613-1", initial_release_date: "2020-03-09T09:24:58Z", revision_history: [ { date: "2020-03-09T09:24:58Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-4.12.14-14.17.1.noarch", product: { name: "kernel-devel-rt-4.12.14-14.17.1.noarch", product_id: "kernel-devel-rt-4.12.14-14.17.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-4.12.14-14.17.1.noarch", product: { name: "kernel-source-rt-4.12.14-14.17.1.noarch", product_id: "kernel-source-rt-4.12.14-14.17.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", product: { name: "cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", product_id: "cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-4.12.14-14.17.1.x86_64", product: { name: "cluster-md-kmp-rt_debug-4.12.14-14.17.1.x86_64", product_id: "cluster-md-kmp-rt_debug-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-4.12.14-14.17.1.x86_64", product: { name: "dlm-kmp-rt-4.12.14-14.17.1.x86_64", product_id: "dlm-kmp-rt-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-4.12.14-14.17.1.x86_64", product: { name: "dlm-kmp-rt_debug-4.12.14-14.17.1.x86_64", product_id: "dlm-kmp-rt_debug-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-4.12.14-14.17.1.x86_64", product: { name: "gfs2-kmp-rt-4.12.14-14.17.1.x86_64", product_id: "gfs2-kmp-rt-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-4.12.14-14.17.1.x86_64", product: { name: "gfs2-kmp-rt_debug-4.12.14-14.17.1.x86_64", product_id: "gfs2-kmp-rt_debug-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-4.12.14-14.17.1.x86_64", product: { name: "kernel-rt-4.12.14-14.17.1.x86_64", product_id: "kernel-rt-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-base-4.12.14-14.17.1.x86_64", product: { name: "kernel-rt-base-4.12.14-14.17.1.x86_64", product_id: "kernel-rt-base-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-4.12.14-14.17.1.x86_64", product: { name: "kernel-rt-devel-4.12.14-14.17.1.x86_64", product_id: "kernel-rt-devel-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-4.12.14-14.17.1.x86_64", product: { name: "kernel-rt-extra-4.12.14-14.17.1.x86_64", product_id: "kernel-rt-extra-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-4.12.14-14.17.1.x86_64", product: { name: "kernel-rt-livepatch-devel-4.12.14-14.17.1.x86_64", product_id: "kernel-rt-livepatch-devel-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-4.12.14-14.17.1.x86_64", product: { name: "kernel-rt_debug-4.12.14-14.17.1.x86_64", product_id: "kernel-rt_debug-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-base-4.12.14-14.17.1.x86_64", product: { name: "kernel-rt_debug-base-4.12.14-14.17.1.x86_64", product_id: "kernel-rt_debug-base-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", product: { name: "kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", product_id: "kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-4.12.14-14.17.1.x86_64", product: { name: "kernel-rt_debug-extra-4.12.14-14.17.1.x86_64", product_id: "kernel-rt_debug-extra-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-4.12.14-14.17.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-4.12.14-14.17.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-4.12.14-14.17.1.x86_64", product: { name: "kernel-syms-rt-4.12.14-14.17.1.x86_64", product_id: "kernel-syms-rt-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-4.12.14-14.17.1.x86_64", product: { name: "kselftests-kmp-rt-4.12.14-14.17.1.x86_64", product_id: "kselftests-kmp-rt-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-4.12.14-14.17.1.x86_64", product: { name: "kselftests-kmp-rt_debug-4.12.14-14.17.1.x86_64", product_id: "kselftests-kmp-rt_debug-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", product: { name: "ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", product_id: "ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-4.12.14-14.17.1.x86_64", product: { name: "ocfs2-kmp-rt_debug-4.12.14-14.17.1.x86_64", product_id: "ocfs2-kmp-rt_debug-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-4.12.14-14.17.1.x86_64", product: { name: "reiserfs-kmp-rt-4.12.14-14.17.1.x86_64", product_id: "reiserfs-kmp-rt-4.12.14-14.17.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt_debug-4.12.14-14.17.1.x86_64", product: { name: "reiserfs-kmp-rt_debug-4.12.14-14.17.1.x86_64", product_id: "reiserfs-kmp-rt_debug-4.12.14-14.17.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Real Time Module 15 SP1", product: { name: "SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-4.12.14-14.17.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", }, product_reference: "cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-4.12.14-14.17.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", }, product_reference: "dlm-kmp-rt-4.12.14-14.17.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-4.12.14-14.17.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", }, product_reference: "gfs2-kmp-rt-4.12.14-14.17.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-4.12.14-14.17.1.noarch as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", }, product_reference: "kernel-devel-rt-4.12.14-14.17.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-4.12.14-14.17.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", }, product_reference: "kernel-rt-4.12.14-14.17.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-base-4.12.14-14.17.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", }, product_reference: "kernel-rt-base-4.12.14-14.17.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-4.12.14-14.17.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", }, product_reference: "kernel-rt-devel-4.12.14-14.17.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-4.12.14-14.17.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", }, product_reference: "kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-4.12.14-14.17.1.noarch as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", }, product_reference: "kernel-source-rt-4.12.14-14.17.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-4.12.14-14.17.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", }, product_reference: "kernel-syms-rt-4.12.14-14.17.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-4.12.14-14.17.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", }, product_reference: "ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2019-14615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14615", }, ], notes: [ { category: "general", text: "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14615", url: "https://www.suse.com/security/cve/CVE-2019-14615", }, { category: "external", summary: "SUSE Bug 1160195 for CVE-2019-14615", url: "https://bugzilla.suse.com/1160195", }, { category: "external", summary: "SUSE Bug 1165881 for CVE-2019-14615", url: "https://bugzilla.suse.com/1165881", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-14615", }, { cve: "CVE-2019-14895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14895", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14895", url: "https://www.suse.com/security/cve/CVE-2019-14895", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1157158 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157158", }, { category: "external", summary: "SUSE Bug 1173100 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173100", }, { category: "external", summary: "SUSE Bug 1173660 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "important", }, ], title: "CVE-2019-14895", }, { cve: "CVE-2019-14896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14896", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14896", url: "https://www.suse.com/security/cve/CVE-2019-14896", }, { category: "external", summary: "SUSE Bug 1157157 for CVE-2019-14896", url: "https://bugzilla.suse.com/1157157", }, { category: "external", summary: "SUSE Bug 1160468 for CVE-2019-14896", url: "https://bugzilla.suse.com/1160468", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "important", }, ], title: "CVE-2019-14896", }, { cve: "CVE-2019-14897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14897", }, ], notes: [ { category: "general", text: "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14897", url: "https://www.suse.com/security/cve/CVE-2019-14897", }, { category: "external", summary: "SUSE Bug 1157155 for CVE-2019-14897", url: "https://bugzilla.suse.com/1157155", }, { category: "external", summary: "SUSE Bug 1160467 for CVE-2019-14897", url: "https://bugzilla.suse.com/1160467", }, { category: "external", summary: "SUSE Bug 1160468 for CVE-2019-14897", url: "https://bugzilla.suse.com/1160468", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "important", }, ], title: "CVE-2019-14897", }, { cve: "CVE-2019-14901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14901", }, ], notes: [ { category: "general", text: "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14901", url: "https://www.suse.com/security/cve/CVE-2019-14901", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14901", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1173661 for CVE-2019-14901", url: "https://bugzilla.suse.com/1173661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "important", }, ], title: "CVE-2019-14901", }, { cve: "CVE-2019-15213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15213", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15213", url: "https://www.suse.com/security/cve/CVE-2019-15213", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146544 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146544", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-15213", }, { cve: "CVE-2019-16746", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16746", }, ], notes: [ { category: "general", text: "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16746", url: "https://www.suse.com/security/cve/CVE-2019-16746", }, { category: "external", summary: "SUSE Bug 1152107 for CVE-2019-16746", url: "https://bugzilla.suse.com/1152107", }, { category: "external", summary: "SUSE Bug 1173659 for CVE-2019-16746", url: "https://bugzilla.suse.com/1173659", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "important", }, ], title: "CVE-2019-16746", }, { cve: "CVE-2019-16994", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16994", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn->fb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16994", url: "https://www.suse.com/security/cve/CVE-2019-16994", }, { category: "external", summary: "SUSE Bug 1161523 for CVE-2019-16994", url: "https://bugzilla.suse.com/1161523", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-16994", }, { cve: "CVE-2019-18660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18660", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18660", url: "https://www.suse.com/security/cve/CVE-2019-18660", }, { category: "external", summary: "SUSE Bug 1157038 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157038", }, { category: "external", summary: "SUSE Bug 1157923 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-18660", }, { cve: "CVE-2019-18683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18683", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18683", url: "https://www.suse.com/security/cve/CVE-2019-18683", }, { category: "external", summary: "SUSE Bug 1155897 for CVE-2019-18683", url: "https://bugzilla.suse.com/1155897", }, { category: "external", summary: "SUSE Bug 1173868 for CVE-2019-18683", url: "https://bugzilla.suse.com/1173868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-18683", }, { cve: "CVE-2019-18808", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18808", }, ], notes: [ { category: "general", text: "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18808", url: "https://www.suse.com/security/cve/CVE-2019-18808", }, { category: "external", summary: "SUSE Bug 1156259 for CVE-2019-18808", url: "https://bugzilla.suse.com/1156259", }, { category: "external", summary: "SUSE Bug 1189884 for CVE-2019-18808", url: "https://bugzilla.suse.com/1189884", }, { category: "external", summary: "SUSE Bug 1190534 for CVE-2019-18808", url: "https://bugzilla.suse.com/1190534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-18808", }, { cve: "CVE-2019-18809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18809", }, ], notes: [ { category: "general", text: "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18809", url: "https://www.suse.com/security/cve/CVE-2019-18809", }, { category: "external", summary: "SUSE Bug 1156258 for CVE-2019-18809", url: "https://bugzilla.suse.com/1156258", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-18809", }, { cve: "CVE-2019-19036", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19036", }, ], notes: [ { category: "general", text: "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19036", url: "https://www.suse.com/security/cve/CVE-2019-19036", }, { category: "external", summary: "SUSE Bug 1157692 for CVE-2019-19036", url: "https://bugzilla.suse.com/1157692", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19036", }, { cve: "CVE-2019-19045", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19045", }, ], notes: [ { category: "general", text: "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19045", url: "https://www.suse.com/security/cve/CVE-2019-19045", }, { category: "external", summary: "SUSE Bug 1161522 for CVE-2019-19045", url: "https://bugzilla.suse.com/1161522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19045", }, { cve: "CVE-2019-19046", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19046", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19046", url: "https://www.suse.com/security/cve/CVE-2019-19046", }, { category: "external", summary: "SUSE Bug 1157304 for CVE-2019-19046", url: "https://bugzilla.suse.com/1157304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19046", }, { cve: "CVE-2019-19049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19049", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19049", url: "https://www.suse.com/security/cve/CVE-2019-19049", }, { category: "external", summary: "SUSE Bug 1157173 for CVE-2019-19049", url: "https://bugzilla.suse.com/1157173", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19049", }, { cve: "CVE-2019-19051", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19051", }, ], notes: [ { category: "general", text: "A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19051", url: "https://www.suse.com/security/cve/CVE-2019-19051", }, { category: "external", summary: "SUSE Bug 1159024 for CVE-2019-19051", url: "https://bugzilla.suse.com/1159024", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19051", }, { cve: "CVE-2019-19052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19052", }, ], notes: [ { category: "general", text: "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19052", url: "https://www.suse.com/security/cve/CVE-2019-19052", }, { category: "external", summary: "SUSE Bug 1157324 for CVE-2019-19052", url: "https://bugzilla.suse.com/1157324", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19052", }, { cve: "CVE-2019-19054", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19054", }, ], notes: [ { category: "general", text: "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19054", url: "https://www.suse.com/security/cve/CVE-2019-19054", }, { category: "external", summary: "SUSE Bug 1161518 for CVE-2019-19054", url: "https://bugzilla.suse.com/1161518", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19054", }, { cve: "CVE-2019-19056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19056", }, ], notes: [ { category: "general", text: "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19056", url: "https://www.suse.com/security/cve/CVE-2019-19056", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19056", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19057", }, ], notes: [ { category: "general", text: "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19057", url: "https://www.suse.com/security/cve/CVE-2019-19057", }, { category: "external", summary: "SUSE Bug 1157193 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157193", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "low", }, ], title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19058", }, ], notes: [ { category: "general", text: "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19058", url: "https://www.suse.com/security/cve/CVE-2019-19058", }, { category: "external", summary: "SUSE Bug 1157145 for CVE-2019-19058", url: "https://bugzilla.suse.com/1157145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19058", }, { cve: "CVE-2019-19060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19060", }, ], notes: [ { category: "general", text: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19060", url: "https://www.suse.com/security/cve/CVE-2019-19060", }, { category: "external", summary: "SUSE Bug 1157178 for CVE-2019-19060", url: "https://bugzilla.suse.com/1157178", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19060", }, { cve: "CVE-2019-19062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19062", }, ], notes: [ { category: "general", text: "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19062", url: "https://www.suse.com/security/cve/CVE-2019-19062", }, { category: "external", summary: "SUSE Bug 1157333 for CVE-2019-19062", url: "https://bugzilla.suse.com/1157333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19063", }, ], notes: [ { category: "general", text: "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19063", url: "https://www.suse.com/security/cve/CVE-2019-19063", }, { category: "external", summary: "SUSE Bug 1157298 for CVE-2019-19063", url: "https://bugzilla.suse.com/1157298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19063", }, { cve: "CVE-2019-19065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19065", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19065", url: "https://www.suse.com/security/cve/CVE-2019-19065", }, { category: "external", summary: "SUSE Bug 1157191 for CVE-2019-19065", url: "https://bugzilla.suse.com/1157191", }, { category: "external", summary: "SUSE Bug 1173961 for CVE-2019-19065", url: "https://bugzilla.suse.com/1173961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "important", }, ], title: "CVE-2019-19065", }, { cve: "CVE-2019-19066", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19066", }, ], notes: [ { category: "general", text: "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19066", url: "https://www.suse.com/security/cve/CVE-2019-19066", }, { category: "external", summary: "SUSE Bug 1157303 for CVE-2019-19066", url: "https://bugzilla.suse.com/1157303", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19066", }, { cve: "CVE-2019-19067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19067", }, ], notes: [ { category: "general", text: "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19067", url: "https://www.suse.com/security/cve/CVE-2019-19067", }, { category: "external", summary: "SUSE Bug 1157180 for CVE-2019-19067", url: "https://bugzilla.suse.com/1157180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19068", }, ], notes: [ { category: "general", text: "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19068", url: "https://www.suse.com/security/cve/CVE-2019-19068", }, { category: "external", summary: "SUSE Bug 1157307 for CVE-2019-19068", url: "https://bugzilla.suse.com/1157307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19068", }, { cve: "CVE-2019-19073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19073", }, ], notes: [ { category: "general", text: "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19073", url: "https://www.suse.com/security/cve/CVE-2019-19073", }, { category: "external", summary: "SUSE Bug 1157070 for CVE-2019-19073", url: "https://bugzilla.suse.com/1157070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19074", }, ], notes: [ { category: "general", text: "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19074", url: "https://www.suse.com/security/cve/CVE-2019-19074", }, { category: "external", summary: "SUSE Bug 1157143 for CVE-2019-19074", url: "https://bugzilla.suse.com/1157143", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19075", }, ], notes: [ { category: "general", text: "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19075", url: "https://www.suse.com/security/cve/CVE-2019-19075", }, { category: "external", summary: "SUSE Bug 1157162 for CVE-2019-19075", url: "https://bugzilla.suse.com/1157162", }, { category: "external", summary: "SUSE Bug 1173958 for CVE-2019-19075", url: "https://bugzilla.suse.com/1173958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "low", }, ], title: "CVE-2019-19075", }, { cve: "CVE-2019-19077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19077", }, ], notes: [ { category: "general", text: "A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19077", url: "https://www.suse.com/security/cve/CVE-2019-19077", }, { category: "external", summary: "SUSE Bug 1157171 for CVE-2019-19077", url: "https://bugzilla.suse.com/1157171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19077", }, { cve: "CVE-2019-19078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19078", }, ], notes: [ { category: "general", text: "A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19078", url: "https://www.suse.com/security/cve/CVE-2019-19078", }, { category: "external", summary: "SUSE Bug 1157032 for CVE-2019-19078", url: "https://bugzilla.suse.com/1157032", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19078", }, { cve: "CVE-2019-19080", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19080", }, ], notes: [ { category: "general", text: "Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19080", url: "https://www.suse.com/security/cve/CVE-2019-19080", }, { category: "external", summary: "SUSE Bug 1157044 for CVE-2019-19080", url: "https://bugzilla.suse.com/1157044", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19080", }, { cve: "CVE-2019-19081", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19081", }, ], notes: [ { category: "general", text: "A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19081", url: "https://www.suse.com/security/cve/CVE-2019-19081", }, { category: "external", summary: "SUSE Bug 1157045 for CVE-2019-19081", url: "https://bugzilla.suse.com/1157045", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19081", }, { cve: "CVE-2019-19082", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19082", }, ], notes: [ { category: "general", text: "Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19082", url: "https://www.suse.com/security/cve/CVE-2019-19082", }, { category: "external", summary: "SUSE Bug 1157046 for CVE-2019-19082", url: "https://bugzilla.suse.com/1157046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19082", }, { cve: "CVE-2019-19083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19083", }, ], notes: [ { category: "general", text: "Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19083", url: "https://www.suse.com/security/cve/CVE-2019-19083", }, { category: "external", summary: "SUSE Bug 1157049 for CVE-2019-19083", url: "https://bugzilla.suse.com/1157049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19083", }, { cve: "CVE-2019-19227", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19227", }, ], notes: [ { category: "general", text: "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19227", url: "https://www.suse.com/security/cve/CVE-2019-19227", }, { category: "external", summary: "SUSE Bug 1157678 for CVE-2019-19227", url: "https://bugzilla.suse.com/1157678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19227", }, { cve: "CVE-2019-19318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19318", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19318", url: "https://www.suse.com/security/cve/CVE-2019-19318", }, { category: "external", summary: "SUSE Bug 1158026 for CVE-2019-19318", url: "https://bugzilla.suse.com/1158026", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19318", }, { cve: "CVE-2019-19319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19319", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19319", url: "https://www.suse.com/security/cve/CVE-2019-19319", }, { category: "external", summary: "SUSE Bug 1158021 for CVE-2019-19319", url: "https://bugzilla.suse.com/1158021", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19319", }, { cve: "CVE-2019-19332", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19332", }, ], notes: [ { category: "general", text: "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19332", url: "https://www.suse.com/security/cve/CVE-2019-19332", }, { category: "external", summary: "SUSE Bug 1158827 for CVE-2019-19332", url: "https://bugzilla.suse.com/1158827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19332", }, { cve: "CVE-2019-19338", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19338", }, ], notes: [ { category: "general", text: "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19338", url: "https://www.suse.com/security/cve/CVE-2019-19338", }, { category: "external", summary: "SUSE Bug 1158954 for CVE-2019-19338", url: "https://bugzilla.suse.com/1158954", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19338", }, { cve: "CVE-2019-19447", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19447", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19447", url: "https://www.suse.com/security/cve/CVE-2019-19447", }, { category: "external", summary: "SUSE Bug 1158819 for CVE-2019-19447", url: "https://bugzilla.suse.com/1158819", }, { category: "external", summary: "SUSE Bug 1173869 for CVE-2019-19447", url: "https://bugzilla.suse.com/1173869", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "important", }, ], title: "CVE-2019-19447", }, { cve: "CVE-2019-19523", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19523", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19523", url: "https://www.suse.com/security/cve/CVE-2019-19523", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158823 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158823", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19523", }, { cve: "CVE-2019-19524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19524", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19524", url: "https://www.suse.com/security/cve/CVE-2019-19524", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158413 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158413", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "low", }, ], title: "CVE-2019-19524", }, { cve: "CVE-2019-19525", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19525", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19525", url: "https://www.suse.com/security/cve/CVE-2019-19525", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158417 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158417", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19525", }, { cve: "CVE-2019-19526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19526", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19526", url: "https://www.suse.com/security/cve/CVE-2019-19526", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158893 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19526", }, { cve: "CVE-2019-19527", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19527", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19527", url: "https://www.suse.com/security/cve/CVE-2019-19527", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158900 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158900", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19527", }, { cve: "CVE-2019-19528", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19528", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19528", url: "https://www.suse.com/security/cve/CVE-2019-19528", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158407 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158407", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19528", }, { cve: "CVE-2019-19529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19529", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19529", url: "https://www.suse.com/security/cve/CVE-2019-19529", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19529", }, { cve: "CVE-2019-19530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19530", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19530", url: "https://www.suse.com/security/cve/CVE-2019-19530", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158410 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158410", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19530", }, { cve: "CVE-2019-19531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19531", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19531", url: "https://www.suse.com/security/cve/CVE-2019-19531", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158427", }, { category: "external", summary: "SUSE Bug 1158445 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158445", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "low", }, ], title: "CVE-2019-19531", }, { cve: "CVE-2019-19532", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19532", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19532", url: "https://www.suse.com/security/cve/CVE-2019-19532", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158823 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158823", }, { category: "external", summary: "SUSE Bug 1158824 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158824", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19532", }, { cve: "CVE-2019-19533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19533", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19533", url: "https://www.suse.com/security/cve/CVE-2019-19533", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19533", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19533", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "low", }, ], title: "CVE-2019-19533", }, { cve: "CVE-2019-19534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19534", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19534", url: "https://www.suse.com/security/cve/CVE-2019-19534", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158398 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158398", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "low", }, ], title: "CVE-2019-19534", }, { cve: "CVE-2019-19535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19535", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19535", url: "https://www.suse.com/security/cve/CVE-2019-19535", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158903 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19535", }, { cve: "CVE-2019-19536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19536", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19536", url: "https://www.suse.com/security/cve/CVE-2019-19536", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158394 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158394", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "low", }, ], title: "CVE-2019-19536", }, { cve: "CVE-2019-19537", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19537", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19537", url: "https://www.suse.com/security/cve/CVE-2019-19537", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158904 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19537", }, { cve: "CVE-2019-19543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19543", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19543", url: "https://www.suse.com/security/cve/CVE-2019-19543", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19543", url: "https://bugzilla.suse.com/1158427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "low", }, ], title: "CVE-2019-19543", }, { cve: "CVE-2019-19767", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19767", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19767", url: "https://www.suse.com/security/cve/CVE-2019-19767", }, { category: "external", summary: "SUSE Bug 1159297 for CVE-2019-19767", url: "https://bugzilla.suse.com/1159297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19767", }, { cve: "CVE-2019-19927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19927", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19927", url: "https://www.suse.com/security/cve/CVE-2019-19927", }, { category: "external", summary: "SUSE Bug 1160147 for CVE-2019-19927", url: "https://bugzilla.suse.com/1160147", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "low", }, ], title: "CVE-2019-19927", }, { cve: "CVE-2019-19965", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19965", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19965", url: "https://www.suse.com/security/cve/CVE-2019-19965", }, { category: "external", summary: "SUSE Bug 1159911 for CVE-2019-19965", url: "https://bugzilla.suse.com/1159911", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-19965", }, { cve: "CVE-2019-19966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19966", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19966", url: "https://www.suse.com/security/cve/CVE-2019-19966", }, { category: "external", summary: "SUSE Bug 1159841 for CVE-2019-19966", url: "https://bugzilla.suse.com/1159841", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "low", }, ], title: "CVE-2019-19966", }, { cve: "CVE-2019-20054", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20054", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20054", url: "https://www.suse.com/security/cve/CVE-2019-20054", }, { category: "external", summary: "SUSE Bug 1159910 for CVE-2019-20054", url: "https://bugzilla.suse.com/1159910", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-20054", }, { cve: "CVE-2019-20095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20095", }, ], notes: [ { category: "general", text: "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20095", url: "https://www.suse.com/security/cve/CVE-2019-20095", }, { category: "external", summary: "SUSE Bug 1159909 for CVE-2019-20095", url: "https://bugzilla.suse.com/1159909", }, { category: "external", summary: "SUSE Bug 1159914 for CVE-2019-20095", url: "https://bugzilla.suse.com/1159914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "important", }, ], title: "CVE-2019-20095", }, { cve: "CVE-2019-20096", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20096", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20096", url: "https://www.suse.com/security/cve/CVE-2019-20096", }, { category: "external", summary: "SUSE Bug 1159908 for CVE-2019-20096", url: "https://bugzilla.suse.com/1159908", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2019-20096", }, { cve: "CVE-2020-7053", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-7053", }, ], notes: [ { category: "general", text: "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-7053", url: "https://www.suse.com/security/cve/CVE-2020-7053", }, { category: "external", summary: "SUSE Bug 1160966 for CVE-2020-7053", url: "https://bugzilla.suse.com/1160966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2020-7053", }, { cve: "CVE-2020-8428", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8428", }, ], notes: [ { category: "general", text: "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8428", url: "https://www.suse.com/security/cve/CVE-2020-8428", }, { category: "external", summary: "SUSE Bug 1162109 for CVE-2020-8428", url: "https://bugzilla.suse.com/1162109", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.17.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.17.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2020-03-09T09:24:58Z", details: "moderate", }, ], title: "CVE-2020-8428", }, ], }
suse-su-2019:3316-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP4 kernel-azure was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-19051: There was a memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1159024).\n- CVE-2019-19338: There was an incomplete fix for Transaction Asynchronous Abort (TAA) (bnc#1158954).\n- CVE-2019-19332: There was an OOB memory write via kvm_dev_ioctl_get_cpuid (bnc#1158827).\n- CVE-2019-19537: There was a race condition bug that can be caused by a malicious USB device in the USB character device driver layer (bnc#1158904).\n- CVE-2019-19535: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bnc#1158903).\n- CVE-2019-19527: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bnc#1158900).\n- CVE-2019-19526: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver (bnc#1158893).\n- CVE-2019-19533: There was an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bnc#1158834).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers (bnc#1158824).\n- CVE-2019-19523: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bnc#1158381 1158823 1158834).\n- CVE-2019-15213: There was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).\n- CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).\n- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).\n- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).\n- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).\n- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).\n- CVE-2019-19528: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (bnc#1158407).\n- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).\n- CVE-2019-19529: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver (bnc#1158381).\n- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).\n- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).\n- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).\n- CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1156258).\n- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).\n- CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157307).\n- CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157298).\n- CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel there was a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client (bnc#1157678).\n- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).\n- CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering copy to udata failures (bnc#1157171).\n- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).\n- CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures (bsc#1157180).\n- CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157178).\n- CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures (bsc#1157173).\n- CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures (bnc#1157162).\n- CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures (bnc#1157145).\n- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).\n- CVE-2019-19073: Fixed memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures (bnc#1157070).\n- CVE-2019-15916: An issue was discovered in the Linux kernel There was a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service (bnc#1149448).\n- CVE-2019-0154: Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1135966).\n- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).\n- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n- ACPI: OSL: only free map once in osl.c (bsc#1051510).\n- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).\n- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n- ALSA: 6fire: Drop the dead code (git-fixes).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).\n- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).\n- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).\n- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n- Bluetooth: delete a stray unlock (bsc#1051510).\n- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).\n- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n- Btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n- CIFS: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n- CIFS: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n- CIFS: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n- CIFS: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n- CIFS: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n- CIFS: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n- CIFS: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n- CIFS: fix max ea value size (bsc#1144333, bsc#1154355).\n- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n- HID: Fix assumption that devices have inputs (git-fixes).\n- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).\n- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).\n- KVM: x86: Remove a spurious export of a static function (bsc#1158954).\n- NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).\n- PCI/PME: Fix possible use-after-free on remove (git-fixes).\n- PCI/PTM: Remove spurious 'd' from granularity message (bsc#1051510).\n- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n- PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30 (git-fixes).\n- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).\n- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).\n- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n- PM / devfreq: passive: fix compiler warning (bsc#1051510).\n- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n- UAS: Revert commit 3ae62a42090f ('UAS: fix alignment of scatter/gather segments').\n- USB: chaoskey: fix error case of a timeout (git-fixes).\n- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- USB: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n- USB: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).\n- USB: serial: mos7720: fix remote wakeup (git-fixes).\n- USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n- USB: serial: mos7840: fix remote wakeup (git-fixes).\n- USB: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n- USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- USBIP: add config dependency for SGL_ALLOC (git-fixes).\n- appledisplay: fix error handling in the scheduled work (git-fixes).\n- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n- ata: ep93xx: Use proper enums for directions (bsc#1051510).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: fix vdev-start timeout on error (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n- ath6kl: Fix off by one error in scan completion (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- ath9k_hw: fix uninitialized variable data (bsc#1051510).\n- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).\n- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).\n- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n- brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).\n- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: peak_usb: report bus recovery as well (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n- cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).\n- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n- cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).\n- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n- cpupower: Fix coredump on VMWare (bsc#1051510).\n- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).\n- crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n- dlm: do not leak kernel pointer to userspace (bsc#1051510).\n- dlm: fix invalid free (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n- docs: move protection-keys.rst to the core-api book (bsc#1078248).\n- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).\n- drivers/regulator: fix a missing check of return value (bsc#1051510).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)\n- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)\n- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n- e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n- ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable (bsc#1158646).\n- ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either (bsc#1158647).\n- ext4: fix punch hole for inline_data file systems (bsc#1158640).\n- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n- sctp: Fixed regression (bsc#1158082).\n- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).\n- hypfs: Fix error number left in struct pointer member (bsc#1051510).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n- intel_th: Fix a double put_device() in error path (git-fixes).\n- iomap: Fix pipe page leakage during splicing (bsc#1158651).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: check kasprintf() return value (bsc#1051510).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n- kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).\n- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n- livepatch: Basic API to track system state changes (bsc#1071995 ).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n- loop: add ioctl for changing logical block size (bsc#1108043).\n- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n- mac80211: fix station inactive_time shortly after boot (bsc#1051510).\n- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n- macvlan: schedule bc_work even if error (bsc#1051510).\n- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).\n- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: bdisp: fix memleak on release (git-fixes).\n- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n- media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n- media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n- media: ov6650: Fix control handler not freed on init error (git-fixes).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).\n- media: radio: wl1273: fix interrupt masking on release (git-fixes).\n- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n- media: uvcvideo: Fix error path in control parsing failure (git-fixes).\n- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).\n- media: vim2m: Fix abort issue (git-fixes).\n- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n- mei: bus: prefix device names on bus with the bus name (bsc#1051510).\n- mei: fix modalias documentation (git-fixes).\n- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).\n- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).\n- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n- mmc: core: fix wl1251 sdio quirks (git-fixes).\n- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdio: fix wl1251 vendor id (git-fixes).\n- moduleparam: fix parameter description mismatch (bsc#1051510).\n- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n- mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).\n- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).\n- nbd: prevent memory leak (bsc#1158638).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n- net/smc: Fix error path in smc_init (git-fixes).\n- net/smc: avoid fallback in case of non-blocking connect (git-fixes).\n- net/smc: fix closing of fallback SMC sockets (git-fixes).\n- net/smc: fix ethernet interface refcounting (git-fixes).\n- net/smc: fix refcounting for non-blocking connect() (git-fixes).\n- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).\n- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).\n- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n- net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).\n- net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).\n- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n- net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).\n- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n- net: dsa: fix switch tree list (networking-stable-19_11_05).\n- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n- net: phy: Check against net_device being NULL (bsc#1051510).\n- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).\n- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).\n- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).\n- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: marvell: clear wol event before setting it (bsc#1051510).\n- net: phy: meson-gxl: check phy_write return value (bsc#1051510).\n- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: mscc: read 'vsc8531, edge-slowdown' as an u32 (bsc#1051510).\n- net: phy: mscc: read 'vsc8531,vddmac' as an u32 (bsc#1051510).\n- net: phy: xgene: disable clk on error paths (bsc#1051510).\n- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).\n- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).\n- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).\n- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n- nfc: netlink: fix double device reference drop (git-fixes).\n- nfc: port100: handle command failure cleanly (git-fixes).\n- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n- ocfs2: fix passing zero to 'PTR_ERR' warning (bsc#1158649).\n- openvswitch: fix flow command message size (git-fixes).\n- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).\n- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n- powerpc/bpf: Fix tail call implementation (bsc#1157698).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n- printk: Export console_printk (bsc#1071995).\n- pwm: Clear chip_data in pwm_put() (bsc#1051510).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- pwm: clps711x: Fix period calculation (bsc#1051510).\n- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n- regulator: tps65910: fix a missing check of return value (bsc#1051510).\n- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).\n- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_ops kerneldoc comment (bsc#1051510).\n- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n- rt2800: remove errornous duplicate condition (git-fixes).\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtl818x: fix potential use after free (bsc#1051510).\n- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n- s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n- s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n- s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n- s390/idle: fix cpu idle time calculation (bsc#1051510).\n- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n- s390/process: avoid potential reading of freed stack (bsc#1051510).\n- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n- s390/qeth: return proper errno on IO error (bsc#1051510).\n- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n- s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n- s390: fix stfle zero padding (bsc#1051510).\n- sc16is7xx: Fix for 'Unexpected interrupt: 8' (bsc#1051510).\n- sched/fair: WARN() and refuse to set buddy when !se->on_rq (bsc#1158132).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Correctly retrieve and interpret active flash region (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: max310x: Fix tx_empty() callback (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: Fix use-after-free Read in slip_open (bsc#1051510).\n- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n- smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).\n- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- spi: atmel: Fix CS high support (bsc#1051510).\n- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#1051510).\n- spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch (bsc#1051510).\n- spi: omap2-mcspi: Set FIFO DMA trigger level to word length (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n- spi: spidev: Fix OF tree warning logic (bsc#1051510).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- staging: rtl8192e: fix potential use after free (bsc#1051510).\n- staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids (bsc#1051510).\n- staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).\n- stm class: Fix a double free of stm_source_device (bsc#1051510).\n- supported.conf:\n- synclink_gt(): fix compat_ioctl() (bsc#1051510).\n- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n- thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).\n- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: check msg->req data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n- tipc: compat: allow tipc commands without arguments (bsc#1051510).\n- tipc: fix a missing check of genlmsg_put (bsc#1051510).\n- tipc: fix link name length check (bsc#1051510).\n- tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).\n- tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).\n- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n- tipc: handle the err returned from cmd header function (bsc#1051510).\n- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n- tipc: tipc clang warning (bsc#1051510).\n- tpm: add check after commands attribs tab allocation (bsc#1051510).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: msm_serial: Fix flow control (bsc#1051510).\n- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n- uaccess: Add non-pagefault user-space write function (bsc#1083647).\n- ubifs: Correctly initialize c->min_log_bytes (bsc#1158641).\n- ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 ('usb-storage: Set virt_boundary_mask to avoid SG overflows') (bsc#1051510).\n- usb: chipidea: Fix otg event handler (bsc#1051510).\n- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- usb: handle warm-reset port requests on hub resume (bsc#1051510).\n- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- usbip: Fix free of unallocated memory in vhci tx (git-fixes).\n- usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n- usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n- vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1 (bsc#1051510).\n- video/hdmi: Fix AVI bar unpack (git-fixes).\n- video: backlight: Add devres versions of of_find_backlight (bsc#1090888) Taken for 6010831dde5.\n- video: backlight: Add of_find_backlight helper in backlight.c (bsc#1090888) Taken for 6010831dde5.\n- virtio/s390: fix race on airq_areas (bsc#1051510).\n- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n- virtio_ring: fix return code on DMA mapping fails (git-fixes).\n- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n- watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n- watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n- x86/pkeys: Update documentation about availability (bsc#1078248).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).\n- xfrm: Fix xfrm sel prefix length validation (git-fixes).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3316,SUSE-SLE-SERVER-12-SP4-2019-3316", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3316-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3316-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3316-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html", }, { category: "self", summary: "SUSE Bug 1048942", url: "https://bugzilla.suse.com/1048942", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1082635", url: "https://bugzilla.suse.com/1082635", }, { category: "self", summary: "SUSE Bug 1083647", url: "https://bugzilla.suse.com/1083647", }, { category: "self", summary: "SUSE Bug 1089644", url: "https://bugzilla.suse.com/1089644", }, { category: "self", summary: "SUSE Bug 1090888", url: "https://bugzilla.suse.com/1090888", }, { category: "self", summary: "SUSE Bug 1091041", url: "https://bugzilla.suse.com/1091041", }, { category: "self", summary: "SUSE Bug 1108043", url: "https://bugzilla.suse.com/1108043", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1115026", url: "https://bugzilla.suse.com/1115026", }, { category: "self", summary: "SUSE Bug 1117169", url: "https://bugzilla.suse.com/1117169", }, { category: "self", summary: "SUSE Bug 1120853", url: "https://bugzilla.suse.com/1120853", }, { category: "self", summary: "SUSE Bug 1131107", url: "https://bugzilla.suse.com/1131107", }, { category: "self", summary: "SUSE Bug 1135966", url: "https://bugzilla.suse.com/1135966", }, { category: "self", summary: "SUSE Bug 1138039", url: "https://bugzilla.suse.com/1138039", }, { category: "self", summary: "SUSE Bug 1140948", url: "https://bugzilla.suse.com/1140948", }, { category: "self", summary: "SUSE Bug 1142095", url: "https://bugzilla.suse.com/1142095", }, { category: "self", summary: "SUSE Bug 1143706", url: "https://bugzilla.suse.com/1143706", }, { category: "self", summary: "SUSE Bug 1144333", url: "https://bugzilla.suse.com/1144333", }, { category: "self", summary: "SUSE Bug 1146519", url: "https://bugzilla.suse.com/1146519", }, { category: "self", summary: "SUSE Bug 1146544", url: "https://bugzilla.suse.com/1146544", }, { category: "self", summary: "SUSE Bug 1149448", url: "https://bugzilla.suse.com/1149448", }, { category: "self", summary: "SUSE Bug 1150466", url: "https://bugzilla.suse.com/1150466", }, { category: "self", summary: "SUSE Bug 1151548", url: "https://bugzilla.suse.com/1151548", }, { category: "self", summary: "SUSE Bug 1151900", url: "https://bugzilla.suse.com/1151900", }, { category: "self", summary: "SUSE Bug 1152631", url: "https://bugzilla.suse.com/1152631", }, { category: "self", summary: "SUSE Bug 1153628", url: "https://bugzilla.suse.com/1153628", }, { category: "self", summary: "SUSE Bug 1153811", url: "https://bugzilla.suse.com/1153811", }, { category: "self", summary: "SUSE Bug 1154043", url: "https://bugzilla.suse.com/1154043", }, { category: "self", summary: "SUSE Bug 1154058", url: "https://bugzilla.suse.com/1154058", }, { category: "self", summary: "SUSE Bug 1154124", url: "https://bugzilla.suse.com/1154124", }, { category: "self", summary: "SUSE Bug 1154355", url: "https://bugzilla.suse.com/1154355", }, { category: "self", summary: "SUSE Bug 1154526", url: "https://bugzilla.suse.com/1154526", }, { category: "self", summary: "SUSE Bug 1155021", url: "https://bugzilla.suse.com/1155021", }, { category: "self", summary: "SUSE Bug 1155689", url: "https://bugzilla.suse.com/1155689", }, { category: "self", summary: "SUSE Bug 1155897", url: "https://bugzilla.suse.com/1155897", }, { category: "self", summary: "SUSE Bug 1155921", url: "https://bugzilla.suse.com/1155921", }, { category: "self", summary: "SUSE Bug 1156258", url: "https://bugzilla.suse.com/1156258", }, { category: "self", summary: "SUSE Bug 1156429", url: "https://bugzilla.suse.com/1156429", }, { category: "self", summary: "SUSE Bug 1156466", url: "https://bugzilla.suse.com/1156466", }, { category: "self", summary: "SUSE Bug 1156471", url: "https://bugzilla.suse.com/1156471", }, { category: "self", summary: "SUSE Bug 1156494", url: "https://bugzilla.suse.com/1156494", }, { category: "self", summary: "SUSE Bug 1156609", url: "https://bugzilla.suse.com/1156609", }, { category: "self", summary: "SUSE Bug 1156700", url: "https://bugzilla.suse.com/1156700", }, { category: "self", summary: "SUSE Bug 1156729", url: "https://bugzilla.suse.com/1156729", }, { category: "self", summary: "SUSE Bug 1156882", url: "https://bugzilla.suse.com/1156882", }, { category: "self", summary: "SUSE Bug 1157038", url: "https://bugzilla.suse.com/1157038", }, { category: "self", summary: "SUSE Bug 1157042", url: "https://bugzilla.suse.com/1157042", }, { category: "self", summary: "SUSE Bug 1157070", url: "https://bugzilla.suse.com/1157070", }, { category: "self", summary: "SUSE Bug 1157143", url: "https://bugzilla.suse.com/1157143", }, { category: "self", summary: "SUSE Bug 1157145", url: "https://bugzilla.suse.com/1157145", }, { category: "self", summary: "SUSE Bug 1157158", url: "https://bugzilla.suse.com/1157158", }, { category: "self", summary: "SUSE Bug 1157162", url: "https://bugzilla.suse.com/1157162", }, { category: "self", summary: "SUSE Bug 1157169", url: "https://bugzilla.suse.com/1157169", }, { category: "self", summary: "SUSE Bug 1157171", url: "https://bugzilla.suse.com/1157171", }, { category: "self", summary: "SUSE Bug 1157173", url: "https://bugzilla.suse.com/1157173", }, { category: "self", summary: "SUSE Bug 1157178", url: "https://bugzilla.suse.com/1157178", }, { category: "self", summary: "SUSE Bug 1157180", url: "https://bugzilla.suse.com/1157180", }, { category: "self", summary: "SUSE Bug 1157182", url: "https://bugzilla.suse.com/1157182", }, { category: "self", summary: "SUSE Bug 1157183", url: "https://bugzilla.suse.com/1157183", }, { category: "self", summary: "SUSE Bug 1157184", url: "https://bugzilla.suse.com/1157184", }, { category: "self", summary: "SUSE Bug 1157191", url: "https://bugzilla.suse.com/1157191", }, { category: "self", summary: "SUSE Bug 1157193", url: "https://bugzilla.suse.com/1157193", }, { category: "self", summary: "SUSE Bug 1157197", url: "https://bugzilla.suse.com/1157197", }, { category: "self", summary: "SUSE Bug 1157298", url: "https://bugzilla.suse.com/1157298", }, { category: "self", summary: "SUSE Bug 1157307", url: "https://bugzilla.suse.com/1157307", }, { category: "self", summary: "SUSE Bug 1157324", url: "https://bugzilla.suse.com/1157324", }, { category: "self", summary: "SUSE Bug 1157333", url: "https://bugzilla.suse.com/1157333", }, { category: "self", summary: "SUSE Bug 1157424", url: "https://bugzilla.suse.com/1157424", }, { category: "self", summary: "SUSE Bug 1157463", url: "https://bugzilla.suse.com/1157463", }, { category: "self", summary: "SUSE Bug 1157499", url: "https://bugzilla.suse.com/1157499", }, { category: "self", summary: "SUSE Bug 1157678", url: "https://bugzilla.suse.com/1157678", }, { category: "self", summary: "SUSE Bug 1157698", url: "https://bugzilla.suse.com/1157698", }, { category: "self", summary: "SUSE Bug 1157778", url: "https://bugzilla.suse.com/1157778", }, { category: "self", summary: "SUSE Bug 1157908", url: "https://bugzilla.suse.com/1157908", }, { category: "self", summary: "SUSE Bug 1158049", url: "https://bugzilla.suse.com/1158049", }, { category: "self", summary: "SUSE Bug 1158063", url: "https://bugzilla.suse.com/1158063", }, { category: "self", summary: "SUSE Bug 1158064", url: "https://bugzilla.suse.com/1158064", }, { category: "self", summary: "SUSE Bug 1158065", url: "https://bugzilla.suse.com/1158065", }, { category: "self", summary: "SUSE Bug 1158066", url: "https://bugzilla.suse.com/1158066", }, { category: "self", summary: "SUSE Bug 1158067", url: "https://bugzilla.suse.com/1158067", }, { category: "self", summary: "SUSE Bug 1158068", url: "https://bugzilla.suse.com/1158068", }, { category: "self", summary: "SUSE Bug 1158082", url: "https://bugzilla.suse.com/1158082", }, { category: "self", summary: "SUSE Bug 1158094", url: "https://bugzilla.suse.com/1158094", }, { category: "self", summary: "SUSE Bug 1158132", url: "https://bugzilla.suse.com/1158132", }, { category: "self", summary: "SUSE Bug 1158381", url: "https://bugzilla.suse.com/1158381", }, { category: "self", summary: "SUSE Bug 1158394", url: "https://bugzilla.suse.com/1158394", }, { category: "self", summary: "SUSE Bug 1158398", url: "https://bugzilla.suse.com/1158398", }, { category: "self", summary: "SUSE Bug 1158407", url: "https://bugzilla.suse.com/1158407", }, { category: "self", summary: "SUSE Bug 1158410", url: "https://bugzilla.suse.com/1158410", }, { category: "self", summary: "SUSE Bug 1158413", url: "https://bugzilla.suse.com/1158413", }, { category: "self", summary: "SUSE Bug 1158417", url: "https://bugzilla.suse.com/1158417", }, { category: "self", summary: "SUSE Bug 1158427", url: "https://bugzilla.suse.com/1158427", }, { category: "self", summary: "SUSE Bug 1158445", url: "https://bugzilla.suse.com/1158445", }, { category: "self", summary: "SUSE Bug 1158637", url: "https://bugzilla.suse.com/1158637", }, { category: "self", summary: "SUSE Bug 1158638", url: "https://bugzilla.suse.com/1158638", }, { category: "self", summary: "SUSE Bug 1158639", url: "https://bugzilla.suse.com/1158639", }, { category: "self", summary: "SUSE Bug 1158640", url: "https://bugzilla.suse.com/1158640", }, { category: "self", summary: "SUSE Bug 1158641", url: "https://bugzilla.suse.com/1158641", }, { category: "self", summary: "SUSE Bug 1158643", url: "https://bugzilla.suse.com/1158643", }, { category: "self", summary: "SUSE Bug 1158644", url: "https://bugzilla.suse.com/1158644", }, { category: "self", summary: "SUSE Bug 1158645", url: "https://bugzilla.suse.com/1158645", }, { category: "self", summary: "SUSE Bug 1158646", url: "https://bugzilla.suse.com/1158646", }, { category: "self", summary: "SUSE Bug 1158647", url: "https://bugzilla.suse.com/1158647", }, { category: "self", summary: "SUSE Bug 1158649", url: "https://bugzilla.suse.com/1158649", }, { category: "self", summary: "SUSE Bug 1158651", url: "https://bugzilla.suse.com/1158651", }, { category: "self", summary: "SUSE Bug 1158652", url: "https://bugzilla.suse.com/1158652", }, { category: "self", summary: "SUSE Bug 1158823", url: "https://bugzilla.suse.com/1158823", }, { category: "self", summary: "SUSE Bug 1158824", url: "https://bugzilla.suse.com/1158824", }, { category: "self", summary: "SUSE Bug 1158827", url: "https://bugzilla.suse.com/1158827", }, { category: "self", summary: "SUSE Bug 1158834", url: "https://bugzilla.suse.com/1158834", }, { category: "self", summary: "SUSE Bug 1158893", url: "https://bugzilla.suse.com/1158893", }, { category: "self", summary: "SUSE Bug 1158900", url: "https://bugzilla.suse.com/1158900", }, { category: "self", summary: "SUSE Bug 1158903", url: "https://bugzilla.suse.com/1158903", }, { category: "self", summary: "SUSE Bug 1158904", url: "https://bugzilla.suse.com/1158904", }, { category: "self", summary: "SUSE Bug 1158954", url: "https://bugzilla.suse.com/1158954", }, { category: "self", summary: "SUSE Bug 1159024", url: "https://bugzilla.suse.com/1159024", }, { category: "self", summary: "SUSE CVE CVE-2019-0154 page", url: "https://www.suse.com/security/cve/CVE-2019-0154/", }, { category: "self", summary: "SUSE CVE CVE-2019-14895 page", url: "https://www.suse.com/security/cve/CVE-2019-14895/", }, { category: "self", summary: "SUSE CVE CVE-2019-14901 page", url: "https://www.suse.com/security/cve/CVE-2019-14901/", }, { category: "self", summary: "SUSE CVE CVE-2019-15213 page", url: "https://www.suse.com/security/cve/CVE-2019-15213/", }, { category: "self", summary: "SUSE CVE CVE-2019-15916 page", url: "https://www.suse.com/security/cve/CVE-2019-15916/", }, { category: "self", summary: "SUSE CVE CVE-2019-16231 page", url: "https://www.suse.com/security/cve/CVE-2019-16231/", }, { category: "self", summary: "SUSE CVE CVE-2019-18660 page", url: "https://www.suse.com/security/cve/CVE-2019-18660/", }, { category: "self", summary: "SUSE CVE CVE-2019-18683 page", url: "https://www.suse.com/security/cve/CVE-2019-18683/", }, { category: "self", summary: "SUSE CVE CVE-2019-18809 page", url: "https://www.suse.com/security/cve/CVE-2019-18809/", }, { category: "self", summary: "SUSE CVE CVE-2019-19049 page", url: "https://www.suse.com/security/cve/CVE-2019-19049/", }, { category: "self", summary: "SUSE CVE CVE-2019-19051 page", url: "https://www.suse.com/security/cve/CVE-2019-19051/", }, { category: "self", summary: "SUSE CVE CVE-2019-19052 page", url: "https://www.suse.com/security/cve/CVE-2019-19052/", }, { category: "self", summary: "SUSE CVE CVE-2019-19056 page", url: "https://www.suse.com/security/cve/CVE-2019-19056/", }, { category: "self", summary: "SUSE CVE CVE-2019-19057 page", url: "https://www.suse.com/security/cve/CVE-2019-19057/", }, { category: "self", summary: "SUSE CVE CVE-2019-19058 page", url: "https://www.suse.com/security/cve/CVE-2019-19058/", }, { category: "self", summary: "SUSE CVE CVE-2019-19060 page", url: "https://www.suse.com/security/cve/CVE-2019-19060/", }, { category: "self", summary: "SUSE CVE CVE-2019-19062 page", url: "https://www.suse.com/security/cve/CVE-2019-19062/", }, { category: "self", summary: "SUSE CVE CVE-2019-19063 page", url: "https://www.suse.com/security/cve/CVE-2019-19063/", }, { category: "self", summary: "SUSE CVE CVE-2019-19065 page", url: "https://www.suse.com/security/cve/CVE-2019-19065/", }, { category: "self", summary: "SUSE CVE CVE-2019-19067 page", url: "https://www.suse.com/security/cve/CVE-2019-19067/", }, { category: "self", summary: "SUSE CVE CVE-2019-19068 page", url: "https://www.suse.com/security/cve/CVE-2019-19068/", }, { category: "self", summary: "SUSE CVE CVE-2019-19073 page", url: "https://www.suse.com/security/cve/CVE-2019-19073/", }, { category: "self", summary: "SUSE CVE CVE-2019-19074 page", url: "https://www.suse.com/security/cve/CVE-2019-19074/", }, { category: "self", summary: "SUSE CVE CVE-2019-19075 page", url: "https://www.suse.com/security/cve/CVE-2019-19075/", }, { category: "self", summary: "SUSE CVE CVE-2019-19077 page", url: "https://www.suse.com/security/cve/CVE-2019-19077/", }, { category: "self", summary: "SUSE CVE CVE-2019-19227 page", url: "https://www.suse.com/security/cve/CVE-2019-19227/", }, { category: "self", summary: "SUSE CVE CVE-2019-19332 page", url: "https://www.suse.com/security/cve/CVE-2019-19332/", }, { category: "self", summary: "SUSE CVE CVE-2019-19338 page", url: "https://www.suse.com/security/cve/CVE-2019-19338/", }, { category: "self", summary: "SUSE CVE CVE-2019-19523 page", url: "https://www.suse.com/security/cve/CVE-2019-19523/", }, { category: "self", summary: "SUSE CVE CVE-2019-19524 page", url: "https://www.suse.com/security/cve/CVE-2019-19524/", }, { category: "self", summary: "SUSE CVE CVE-2019-19525 page", url: "https://www.suse.com/security/cve/CVE-2019-19525/", }, { category: "self", summary: "SUSE CVE CVE-2019-19526 page", url: "https://www.suse.com/security/cve/CVE-2019-19526/", }, { category: "self", summary: "SUSE CVE CVE-2019-19527 page", url: "https://www.suse.com/security/cve/CVE-2019-19527/", }, { category: "self", summary: "SUSE CVE CVE-2019-19528 page", url: "https://www.suse.com/security/cve/CVE-2019-19528/", }, { category: "self", summary: "SUSE CVE CVE-2019-19529 page", url: "https://www.suse.com/security/cve/CVE-2019-19529/", }, { category: "self", summary: "SUSE CVE CVE-2019-19530 page", url: "https://www.suse.com/security/cve/CVE-2019-19530/", }, { category: "self", summary: "SUSE CVE CVE-2019-19531 page", url: "https://www.suse.com/security/cve/CVE-2019-19531/", }, { category: "self", summary: "SUSE CVE CVE-2019-19532 page", url: "https://www.suse.com/security/cve/CVE-2019-19532/", }, { category: "self", summary: "SUSE CVE CVE-2019-19533 page", url: "https://www.suse.com/security/cve/CVE-2019-19533/", }, { category: "self", summary: "SUSE CVE CVE-2019-19534 page", url: "https://www.suse.com/security/cve/CVE-2019-19534/", }, { category: "self", summary: "SUSE CVE CVE-2019-19535 page", url: "https://www.suse.com/security/cve/CVE-2019-19535/", }, { category: "self", summary: "SUSE CVE CVE-2019-19536 page", url: "https://www.suse.com/security/cve/CVE-2019-19536/", }, { category: "self", summary: "SUSE CVE CVE-2019-19537 page", url: "https://www.suse.com/security/cve/CVE-2019-19537/", }, { category: "self", summary: "SUSE CVE CVE-2019-19543 page", url: "https://www.suse.com/security/cve/CVE-2019-19543/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-12-17T12:07:58Z", generator: { date: "2019-12-17T12:07:58Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3316-1", initial_release_date: "2019-12-17T12:07:58Z", revision_history: [ { date: "2019-12-17T12:07:58Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-4.12.14-6.34.1.noarch", product: { name: "kernel-devel-azure-4.12.14-6.34.1.noarch", product_id: "kernel-devel-azure-4.12.14-6.34.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.12.14-6.34.1.noarch", product: { name: "kernel-source-azure-4.12.14-6.34.1.noarch", product_id: "kernel-source-azure-4.12.14-6.34.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-4.12.14-6.34.1.x86_64", product: { name: "cluster-md-kmp-azure-4.12.14-6.34.1.x86_64", product_id: "cluster-md-kmp-azure-4.12.14-6.34.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-4.12.14-6.34.1.x86_64", product: { name: "dlm-kmp-azure-4.12.14-6.34.1.x86_64", product_id: "dlm-kmp-azure-4.12.14-6.34.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-4.12.14-6.34.1.x86_64", product: { name: "gfs2-kmp-azure-4.12.14-6.34.1.x86_64", product_id: "gfs2-kmp-azure-4.12.14-6.34.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-4.12.14-6.34.1.x86_64", product: { name: "kernel-azure-4.12.14-6.34.1.x86_64", product_id: "kernel-azure-4.12.14-6.34.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.12.14-6.34.1.x86_64", product: { name: "kernel-azure-base-4.12.14-6.34.1.x86_64", product_id: "kernel-azure-base-4.12.14-6.34.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.12.14-6.34.1.x86_64", product: { name: "kernel-azure-devel-4.12.14-6.34.1.x86_64", product_id: "kernel-azure-devel-4.12.14-6.34.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-4.12.14-6.34.1.x86_64", product: { name: "kernel-azure-extra-4.12.14-6.34.1.x86_64", product_id: "kernel-azure-extra-4.12.14-6.34.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-kgraft-devel-4.12.14-6.34.1.x86_64", product: { name: "kernel-azure-kgraft-devel-4.12.14-6.34.1.x86_64", product_id: "kernel-azure-kgraft-devel-4.12.14-6.34.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.12.14-6.34.1.x86_64", product: { name: "kernel-syms-azure-4.12.14-6.34.1.x86_64", product_id: "kernel-syms-azure-4.12.14-6.34.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-4.12.14-6.34.1.x86_64", product: { name: "kselftests-kmp-azure-4.12.14-6.34.1.x86_64", product_id: "kselftests-kmp-azure-4.12.14-6.34.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-4.12.14-6.34.1.x86_64", product: { name: "ocfs2-kmp-azure-4.12.14-6.34.1.x86_64", product_id: "ocfs2-kmp-azure-4.12.14-6.34.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4", product: { name: "SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-6.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", }, product_reference: "kernel-azure-4.12.14-6.34.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-6.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-6.34.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-6.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-6.34.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-6.34.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-6.34.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-6.34.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-6.34.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-6.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-6.34.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-6.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", }, product_reference: "kernel-azure-4.12.14-6.34.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-6.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-6.34.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-6.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-6.34.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-6.34.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-6.34.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-6.34.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-6.34.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-6.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-6.34.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0154", }, ], notes: [ { category: "general", text: "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0154", url: "https://www.suse.com/security/cve/CVE-2019-0154", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0154", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2019-0154", url: "https://bugzilla.suse.com/1181720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "important", }, ], title: "CVE-2019-0154", }, { cve: "CVE-2019-14895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14895", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14895", url: "https://www.suse.com/security/cve/CVE-2019-14895", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1157158 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157158", }, { category: "external", summary: "SUSE Bug 1173100 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173100", }, { category: "external", summary: "SUSE Bug 1173660 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "important", }, ], title: "CVE-2019-14895", }, { cve: "CVE-2019-14901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14901", }, ], notes: [ { category: "general", text: "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14901", url: "https://www.suse.com/security/cve/CVE-2019-14901", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14901", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1173661 for CVE-2019-14901", url: "https://bugzilla.suse.com/1173661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "important", }, ], title: "CVE-2019-14901", }, { cve: "CVE-2019-15213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15213", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15213", url: "https://www.suse.com/security/cve/CVE-2019-15213", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146544 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146544", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-15213", }, { cve: "CVE-2019-15916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15916", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15916", url: "https://www.suse.com/security/cve/CVE-2019-15916", }, { category: "external", summary: "SUSE Bug 1149448 for CVE-2019-15916", url: "https://bugzilla.suse.com/1149448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "low", }, ], title: "CVE-2019-15916", }, { cve: "CVE-2019-16231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16231", }, ], notes: [ { category: "general", text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16231", url: "https://www.suse.com/security/cve/CVE-2019-16231", }, { category: "external", summary: "SUSE Bug 1150466 for CVE-2019-16231", url: "https://bugzilla.suse.com/1150466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "low", }, ], title: "CVE-2019-16231", }, { cve: "CVE-2019-18660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18660", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18660", url: "https://www.suse.com/security/cve/CVE-2019-18660", }, { category: "external", summary: "SUSE Bug 1157038 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157038", }, { category: "external", summary: "SUSE Bug 1157923 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-18660", }, { cve: "CVE-2019-18683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18683", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18683", url: "https://www.suse.com/security/cve/CVE-2019-18683", }, { category: "external", summary: "SUSE Bug 1155897 for CVE-2019-18683", url: "https://bugzilla.suse.com/1155897", }, { category: "external", summary: "SUSE Bug 1173868 for CVE-2019-18683", url: "https://bugzilla.suse.com/1173868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-18683", }, { cve: "CVE-2019-18809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18809", }, ], notes: [ { category: "general", text: "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18809", url: "https://www.suse.com/security/cve/CVE-2019-18809", }, { category: "external", summary: "SUSE Bug 1156258 for CVE-2019-18809", url: "https://bugzilla.suse.com/1156258", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-18809", }, { cve: "CVE-2019-19049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19049", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19049", url: "https://www.suse.com/security/cve/CVE-2019-19049", }, { category: "external", summary: "SUSE Bug 1157173 for CVE-2019-19049", url: "https://bugzilla.suse.com/1157173", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19049", }, { cve: "CVE-2019-19051", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19051", }, ], notes: [ { category: "general", text: "A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19051", url: "https://www.suse.com/security/cve/CVE-2019-19051", }, { category: "external", summary: "SUSE Bug 1159024 for CVE-2019-19051", url: "https://bugzilla.suse.com/1159024", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19051", }, { cve: "CVE-2019-19052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19052", }, ], notes: [ { category: "general", text: "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19052", url: "https://www.suse.com/security/cve/CVE-2019-19052", }, { category: "external", summary: "SUSE Bug 1157324 for CVE-2019-19052", url: "https://bugzilla.suse.com/1157324", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19052", }, { cve: "CVE-2019-19056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19056", }, ], notes: [ { category: "general", text: "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19056", url: "https://www.suse.com/security/cve/CVE-2019-19056", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19056", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19057", }, ], notes: [ { category: "general", text: "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19057", url: "https://www.suse.com/security/cve/CVE-2019-19057", }, { category: "external", summary: "SUSE Bug 1157193 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157193", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "low", }, ], title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19058", }, ], notes: [ { category: "general", text: "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19058", url: "https://www.suse.com/security/cve/CVE-2019-19058", }, { category: "external", summary: "SUSE Bug 1157145 for CVE-2019-19058", url: "https://bugzilla.suse.com/1157145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19058", }, { cve: "CVE-2019-19060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19060", }, ], notes: [ { category: "general", text: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19060", url: "https://www.suse.com/security/cve/CVE-2019-19060", }, { category: "external", summary: "SUSE Bug 1157178 for CVE-2019-19060", url: "https://bugzilla.suse.com/1157178", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19060", }, { cve: "CVE-2019-19062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19062", }, ], notes: [ { category: "general", text: "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19062", url: "https://www.suse.com/security/cve/CVE-2019-19062", }, { category: "external", summary: "SUSE Bug 1157333 for CVE-2019-19062", url: "https://bugzilla.suse.com/1157333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19063", }, ], notes: [ { category: "general", text: "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19063", url: "https://www.suse.com/security/cve/CVE-2019-19063", }, { category: "external", summary: "SUSE Bug 1157298 for CVE-2019-19063", url: "https://bugzilla.suse.com/1157298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19063", }, { cve: "CVE-2019-19065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19065", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19065", url: "https://www.suse.com/security/cve/CVE-2019-19065", }, { category: "external", summary: "SUSE Bug 1157191 for CVE-2019-19065", url: "https://bugzilla.suse.com/1157191", }, { category: "external", summary: "SUSE Bug 1173961 for CVE-2019-19065", url: "https://bugzilla.suse.com/1173961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "important", }, ], title: "CVE-2019-19065", }, { cve: "CVE-2019-19067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19067", }, ], notes: [ { category: "general", text: "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19067", url: "https://www.suse.com/security/cve/CVE-2019-19067", }, { category: "external", summary: "SUSE Bug 1157180 for CVE-2019-19067", url: "https://bugzilla.suse.com/1157180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19068", }, ], notes: [ { category: "general", text: "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19068", url: "https://www.suse.com/security/cve/CVE-2019-19068", }, { category: "external", summary: "SUSE Bug 1157307 for CVE-2019-19068", url: "https://bugzilla.suse.com/1157307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19068", }, { cve: "CVE-2019-19073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19073", }, ], notes: [ { category: "general", text: "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19073", url: "https://www.suse.com/security/cve/CVE-2019-19073", }, { category: "external", summary: "SUSE Bug 1157070 for CVE-2019-19073", url: "https://bugzilla.suse.com/1157070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19074", }, ], notes: [ { category: "general", text: "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19074", url: "https://www.suse.com/security/cve/CVE-2019-19074", }, { category: "external", summary: "SUSE Bug 1157143 for CVE-2019-19074", url: "https://bugzilla.suse.com/1157143", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19075", }, ], notes: [ { category: "general", text: "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19075", url: "https://www.suse.com/security/cve/CVE-2019-19075", }, { category: "external", summary: "SUSE Bug 1157162 for CVE-2019-19075", url: "https://bugzilla.suse.com/1157162", }, { category: "external", summary: "SUSE Bug 1173958 for CVE-2019-19075", url: "https://bugzilla.suse.com/1173958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "low", }, ], title: "CVE-2019-19075", }, { cve: "CVE-2019-19077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19077", }, ], notes: [ { category: "general", text: "A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19077", url: "https://www.suse.com/security/cve/CVE-2019-19077", }, { category: "external", summary: "SUSE Bug 1157171 for CVE-2019-19077", url: "https://bugzilla.suse.com/1157171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19077", }, { cve: "CVE-2019-19227", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19227", }, ], notes: [ { category: "general", text: "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19227", url: "https://www.suse.com/security/cve/CVE-2019-19227", }, { category: "external", summary: "SUSE Bug 1157678 for CVE-2019-19227", url: "https://bugzilla.suse.com/1157678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19227", }, { cve: "CVE-2019-19332", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19332", }, ], notes: [ { category: "general", text: "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19332", url: "https://www.suse.com/security/cve/CVE-2019-19332", }, { category: "external", summary: "SUSE Bug 1158827 for CVE-2019-19332", url: "https://bugzilla.suse.com/1158827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19332", }, { cve: "CVE-2019-19338", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19338", }, ], notes: [ { category: "general", text: "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19338", url: "https://www.suse.com/security/cve/CVE-2019-19338", }, { category: "external", summary: "SUSE Bug 1158954 for CVE-2019-19338", url: "https://bugzilla.suse.com/1158954", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19338", }, { cve: "CVE-2019-19523", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19523", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19523", url: "https://www.suse.com/security/cve/CVE-2019-19523", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158823 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158823", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19523", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19523", }, { cve: "CVE-2019-19524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19524", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19524", url: "https://www.suse.com/security/cve/CVE-2019-19524", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158413 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158413", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "low", }, ], title: "CVE-2019-19524", }, { cve: "CVE-2019-19525", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19525", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19525", url: "https://www.suse.com/security/cve/CVE-2019-19525", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158417 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158417", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19525", }, { cve: "CVE-2019-19526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19526", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19526", url: "https://www.suse.com/security/cve/CVE-2019-19526", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158893 for CVE-2019-19526", url: "https://bugzilla.suse.com/1158893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19526", }, { cve: "CVE-2019-19527", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19527", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19527", url: "https://www.suse.com/security/cve/CVE-2019-19527", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158900 for CVE-2019-19527", url: "https://bugzilla.suse.com/1158900", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19527", }, { cve: "CVE-2019-19528", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19528", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19528", url: "https://www.suse.com/security/cve/CVE-2019-19528", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158407 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158407", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19528", }, { cve: "CVE-2019-19529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19529", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19529", url: "https://www.suse.com/security/cve/CVE-2019-19529", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19529", }, { cve: "CVE-2019-19530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19530", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19530", url: "https://www.suse.com/security/cve/CVE-2019-19530", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158410 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158410", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19530", }, { cve: "CVE-2019-19531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19531", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19531", url: "https://www.suse.com/security/cve/CVE-2019-19531", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158427", }, { category: "external", summary: "SUSE Bug 1158445 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158445", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "low", }, ], title: "CVE-2019-19531", }, { cve: "CVE-2019-19532", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19532", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19532", url: "https://www.suse.com/security/cve/CVE-2019-19532", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158823 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158823", }, { category: "external", summary: "SUSE Bug 1158824 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158824", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19532", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19532", }, { cve: "CVE-2019-19533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19533", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19533", url: "https://www.suse.com/security/cve/CVE-2019-19533", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19533", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19533", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "low", }, ], title: "CVE-2019-19533", }, { cve: "CVE-2019-19534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19534", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19534", url: "https://www.suse.com/security/cve/CVE-2019-19534", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158398 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158398", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "low", }, ], title: "CVE-2019-19534", }, { cve: "CVE-2019-19535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19535", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19535", url: "https://www.suse.com/security/cve/CVE-2019-19535", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158903 for CVE-2019-19535", url: "https://bugzilla.suse.com/1158903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19535", }, { cve: "CVE-2019-19536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19536", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19536", url: "https://www.suse.com/security/cve/CVE-2019-19536", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158394 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158394", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "low", }, ], title: "CVE-2019-19536", }, { cve: "CVE-2019-19537", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19537", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19537", url: "https://www.suse.com/security/cve/CVE-2019-19537", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158834", }, { category: "external", summary: "SUSE Bug 1158904 for CVE-2019-19537", url: "https://bugzilla.suse.com/1158904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "moderate", }, ], title: "CVE-2019-19537", }, { cve: "CVE-2019-19543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19543", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19543", url: "https://www.suse.com/security/cve/CVE-2019-19543", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19543", url: "https://bugzilla.suse.com/1158427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.34.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.34.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-17T12:07:58Z", details: "low", }, ], title: "CVE-2019-19543", }, ], }
suse-su-2019:3371-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).\n- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).\n- CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1156258).\n- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).\n- CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157307).\n- CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157298).\n- CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel there was a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client (bnc#1157678).\n- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).\n- CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering copy to udata failures (bnc#1157171).\n- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).\n- CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures (bsc#1157180).\n- CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157178).\n- CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures (bsc#1157173).\n- CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures (bnc#1157162).\n- CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures (bnc#1157145).\n- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).\n- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function (bnc#1157070).\n- CVE-2019-15916: An issue was discovered in the Linux kernel There was a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service (bnc#1149448).\n- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).\n- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).\n- CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket (bnc#1152782).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n- ALSA: 6fire: Drop the dead code (git-fixes).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n- Bluetooth: delete a stray unlock (bsc#1051510).\n- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n- Btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n- CIFS: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n- CIFS: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n- CIFS: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n- CIFS: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n- CIFS: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n- CIFS: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n- CIFS: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n- CIFS: fix max ea value size (bsc#1144333, bsc#1154355).\n- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n- HID: Fix assumption that devices have inputs (git-fixes).\n- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).\n- NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI/PME: Fix possible use-after-free on remove (git-fixes).\n- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n- PM / devfreq: passive: fix compiler warning (bsc#1051510).\n- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n- README.BRANCH: Add Denis as branch maintainer\n- Revert synaptics-rmi4 patch due to regression (bsc#1155982) Also blacklisting it\n- UAS: Revert commit 3ae62a42090f ('UAS: fix alignment of scatter/gather segments').\n- USB: chaoskey: fix error case of a timeout (git-fixes).\n- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- USB: ldusb: fix control-message timeout (bsc#1051510).\n- USB: ldusb: fix ring-buffer locking (bsc#1051510).\n- USB: serial: mos7720: fix remote wakeup (git-fixes).\n- USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n- USB: serial: mos7840: fix remote wakeup (git-fixes).\n- USB: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n- USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- USBIP: add config dependency for SGL_ALLOC (git-fixes).\n- appledisplay: fix error handling in the scheduled work (git-fixes).\n- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n- ata: ep93xx: Use proper enums for directions (bsc#1051510).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: fix vdev-start timeout on error (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- ath9k_hw: fix uninitialized variable data (bsc#1051510).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n- brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n- cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n- cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).\n- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n- cpupower: Fix coredump on VMWare (bsc#1051510).\n- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n- crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n- dlm: do not leak kernel pointer to userspace (bsc#1051510).\n- dlm: fix invalid free (bsc#1051510).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n- docs: move protection-keys.rst to the core-api book (bsc#1078248).\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n- e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n- hypfs: Fix error number left in struct pointer member (bsc#1051510).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n- intel_th: Fix a double put_device() in error path (git-fixes).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: check kasprintf() return value (bsc#1051510).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n- kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).\n- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- loop: add ioctl for changing logical block size (bsc#1108043).\n- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n- macvlan: schedule bc_work even if error (bsc#1051510).\n- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: bdisp: fix memleak on release (git-fixes).\n- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n- media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n- media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).\n- media: radio: wl1273: fix interrupt masking on release (git-fixes).\n- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n- media: vim2m: Fix abort issue (git-fixes).\n- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n- mei: fix modalias documentation (git-fixes).\n- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).\n- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n- mmc: core: fix wl1251 sdio quirks (git-fixes).\n- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdio: fix wl1251 vendor id (git-fixes).\n- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n- mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n- net/smc: Fix error path in smc_init (git-fixes).\n- net/smc: avoid fallback in case of non-blocking connect (git-fixes).\n- net/smc: fix closing of fallback SMC sockets (git-fixes).\n- net/smc: fix ethernet interface refcounting (git-fixes).\n- net/smc: fix refcounting for non-blocking connect() (git-fixes).\n- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).\n- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).\n- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n- net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).\n- net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).\n- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n- net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).\n- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n- net: dsa: fix switch tree list (networking-stable-19_11_05).\n- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n- nfc: netlink: fix double device reference drop (git-fixes).\n- nfc: port100: handle command failure cleanly (git-fixes).\n- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n- openvswitch: fix flow command message size (git-fixes).\n- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).\n- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n- powerpc/bpf: Fix tail call implementation (bsc#1157698).\n- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).\n- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n- s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n- s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n- s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390/idle: fix cpu idle time calculation (bsc#1051510).\n- s390/process: avoid potential reading of freed stack (bsc#1051510).\n- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n- s390/qeth: return proper errno on IO error (bsc#1051510).\n- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n- s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n- s390: fix stfle zero padding (bsc#1051510).\n- sc16is7xx: Fix for 'Unexpected interrupt: 8' (bsc#1051510).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n- sctp: Fixed a regression (bsc#1158082).\n- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: Fix use-after-free Read in slip_open (bsc#1051510).\n- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n- smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).\n- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- spi: atmel: Fix CS high support (bsc#1051510).\n- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n- spi: spidev: Fix OF tree warning logic (bsc#1051510).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n- tpm: add check after commands attribs tab allocation (bsc#1051510).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 ('usb-storage: Set virt_boundary_mask to avoid SG overflows') (bsc#1051510).\n- usb: chipidea: Fix otg event handler (bsc#1051510).\n- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- usb: handle warm-reset port requests on hub resume (bsc#1051510).\n- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- usbip: Fix free of unallocated memory in vhci tx (git-fixes).\n- usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n- usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n- video/hdmi: Fix AVI bar unpack (git-fixes).\n- virtio/s390: fix race on airq_areas (bsc#1051510).\n- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n- virtio_ring: fix return code on DMA mapping fails (git-fixes).\n- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n- watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n- x86/pkeys: Update documentation about availability (bsc#1078248).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n- xfrm: Fix xfrm sel prefix length validation (git-fixes).\n- xfrm: fix sa selector validation (bsc#1156609).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3371,SUSE-SLE-DESKTOP-12-SP4-2019-3371,SUSE-SLE-HA-12-SP4-2019-3371,SUSE-SLE-Live-Patching-12-SP4-2019-3371,SUSE-SLE-SDK-12-SP4-2019-3371,SUSE-SLE-SERVER-12-SP4-2019-3371,SUSE-SLE-WE-12-SP4-2019-3371", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3371-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3371-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193371-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3371-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html", }, { category: "self", summary: "SUSE Bug 1048942", url: "https://bugzilla.suse.com/1048942", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1082635", url: "https://bugzilla.suse.com/1082635", }, { category: "self", summary: "SUSE Bug 1089644", url: "https://bugzilla.suse.com/1089644", }, { category: "self", summary: "SUSE Bug 1091041", url: "https://bugzilla.suse.com/1091041", }, { category: "self", summary: "SUSE Bug 1108043", url: "https://bugzilla.suse.com/1108043", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1117169", url: "https://bugzilla.suse.com/1117169", }, { category: "self", summary: "SUSE Bug 1131107", url: "https://bugzilla.suse.com/1131107", }, { category: "self", summary: "SUSE Bug 1138039", url: "https://bugzilla.suse.com/1138039", }, { category: "self", summary: "SUSE Bug 1140948", url: "https://bugzilla.suse.com/1140948", }, { category: "self", summary: "SUSE Bug 1143706", url: "https://bugzilla.suse.com/1143706", }, { category: "self", summary: "SUSE Bug 1144333", url: "https://bugzilla.suse.com/1144333", }, { category: "self", summary: "SUSE Bug 1149448", url: "https://bugzilla.suse.com/1149448", }, { category: "self", summary: "SUSE Bug 1150466", url: "https://bugzilla.suse.com/1150466", }, { category: "self", summary: "SUSE Bug 1151548", url: "https://bugzilla.suse.com/1151548", }, { category: "self", summary: "SUSE Bug 1151900", url: "https://bugzilla.suse.com/1151900", }, { category: "self", summary: "SUSE Bug 1152782", url: "https://bugzilla.suse.com/1152782", }, { category: "self", summary: "SUSE Bug 1153628", url: "https://bugzilla.suse.com/1153628", }, { category: "self", summary: "SUSE Bug 1153681", url: "https://bugzilla.suse.com/1153681", }, { category: "self", summary: "SUSE Bug 1153811", url: "https://bugzilla.suse.com/1153811", }, { category: "self", summary: "SUSE Bug 1154043", url: "https://bugzilla.suse.com/1154043", }, { category: "self", summary: "SUSE Bug 1154058", url: "https://bugzilla.suse.com/1154058", }, { category: "self", summary: "SUSE Bug 1154124", url: "https://bugzilla.suse.com/1154124", }, { category: "self", summary: "SUSE Bug 1154355", url: "https://bugzilla.suse.com/1154355", }, { category: "self", summary: "SUSE Bug 1154526", url: "https://bugzilla.suse.com/1154526", }, { category: "self", summary: "SUSE Bug 1154956", url: "https://bugzilla.suse.com/1154956", }, { category: "self", summary: "SUSE Bug 1155021", url: "https://bugzilla.suse.com/1155021", }, { category: "self", summary: "SUSE Bug 1155689", url: "https://bugzilla.suse.com/1155689", }, { category: "self", summary: "SUSE Bug 1155692", url: "https://bugzilla.suse.com/1155692", }, { category: "self", summary: "SUSE Bug 1155836", url: "https://bugzilla.suse.com/1155836", }, { category: "self", summary: "SUSE Bug 1155897", url: "https://bugzilla.suse.com/1155897", }, { category: "self", summary: "SUSE Bug 1155921", url: "https://bugzilla.suse.com/1155921", }, { category: "self", summary: "SUSE Bug 1155982", url: "https://bugzilla.suse.com/1155982", }, { category: "self", summary: "SUSE Bug 1156187", url: "https://bugzilla.suse.com/1156187", }, { category: "self", summary: "SUSE Bug 1156258", url: "https://bugzilla.suse.com/1156258", }, { category: "self", summary: "SUSE Bug 1156429", url: "https://bugzilla.suse.com/1156429", }, { category: "self", summary: "SUSE Bug 1156466", url: "https://bugzilla.suse.com/1156466", }, { category: "self", summary: "SUSE Bug 1156471", url: "https://bugzilla.suse.com/1156471", }, { category: "self", summary: "SUSE Bug 1156494", url: "https://bugzilla.suse.com/1156494", }, { category: "self", summary: "SUSE Bug 1156609", url: "https://bugzilla.suse.com/1156609", }, { category: "self", summary: "SUSE Bug 1156700", url: "https://bugzilla.suse.com/1156700", }, { category: "self", summary: "SUSE Bug 1156729", url: "https://bugzilla.suse.com/1156729", }, { category: "self", summary: "SUSE Bug 1156882", url: "https://bugzilla.suse.com/1156882", }, { category: "self", summary: "SUSE Bug 1157038", url: "https://bugzilla.suse.com/1157038", }, { category: "self", summary: "SUSE Bug 1157042", url: "https://bugzilla.suse.com/1157042", }, { category: "self", summary: "SUSE Bug 1157070", url: "https://bugzilla.suse.com/1157070", }, { category: "self", summary: "SUSE Bug 1157143", url: "https://bugzilla.suse.com/1157143", }, { category: "self", summary: "SUSE Bug 1157145", url: "https://bugzilla.suse.com/1157145", }, { category: "self", summary: "SUSE Bug 1157158", url: "https://bugzilla.suse.com/1157158", }, { category: "self", summary: "SUSE Bug 1157162", url: "https://bugzilla.suse.com/1157162", }, { category: "self", summary: "SUSE Bug 1157171", url: "https://bugzilla.suse.com/1157171", }, { category: "self", summary: "SUSE Bug 1157173", url: "https://bugzilla.suse.com/1157173", }, { category: "self", summary: "SUSE Bug 1157178", url: "https://bugzilla.suse.com/1157178", }, { category: "self", summary: "SUSE Bug 1157180", url: "https://bugzilla.suse.com/1157180", }, { category: "self", summary: "SUSE Bug 1157182", url: "https://bugzilla.suse.com/1157182", }, { category: "self", summary: "SUSE Bug 1157183", url: "https://bugzilla.suse.com/1157183", }, { category: "self", summary: "SUSE Bug 1157184", url: "https://bugzilla.suse.com/1157184", }, { category: "self", summary: "SUSE Bug 1157191", url: "https://bugzilla.suse.com/1157191", }, { category: "self", summary: "SUSE Bug 1157193", url: "https://bugzilla.suse.com/1157193", }, { category: "self", summary: "SUSE Bug 1157197", url: "https://bugzilla.suse.com/1157197", }, { category: "self", summary: "SUSE Bug 1157298", url: "https://bugzilla.suse.com/1157298", }, { category: "self", summary: "SUSE Bug 1157307", url: "https://bugzilla.suse.com/1157307", }, { category: "self", summary: "SUSE Bug 1157324", url: "https://bugzilla.suse.com/1157324", }, { category: "self", summary: "SUSE Bug 1157333", url: "https://bugzilla.suse.com/1157333", }, { category: "self", summary: "SUSE Bug 1157424", url: "https://bugzilla.suse.com/1157424", }, { category: "self", summary: "SUSE Bug 1157463", url: "https://bugzilla.suse.com/1157463", }, { category: "self", summary: "SUSE Bug 1157499", url: "https://bugzilla.suse.com/1157499", }, { category: "self", summary: "SUSE Bug 1157678", url: "https://bugzilla.suse.com/1157678", }, { category: "self", summary: "SUSE Bug 1157698", url: "https://bugzilla.suse.com/1157698", }, { category: "self", summary: "SUSE Bug 1157778", url: "https://bugzilla.suse.com/1157778", }, { category: "self", summary: "SUSE Bug 1157908", url: "https://bugzilla.suse.com/1157908", }, { category: "self", summary: "SUSE Bug 1158049", url: "https://bugzilla.suse.com/1158049", }, { category: "self", summary: "SUSE Bug 1158063", url: "https://bugzilla.suse.com/1158063", }, { category: "self", summary: "SUSE Bug 1158064", url: "https://bugzilla.suse.com/1158064", }, { category: "self", summary: "SUSE Bug 1158065", url: "https://bugzilla.suse.com/1158065", }, { category: "self", summary: "SUSE Bug 1158066", url: "https://bugzilla.suse.com/1158066", }, { category: "self", summary: "SUSE Bug 1158067", url: "https://bugzilla.suse.com/1158067", }, { category: "self", summary: "SUSE Bug 1158068", url: "https://bugzilla.suse.com/1158068", }, { category: "self", summary: "SUSE Bug 1158082", url: "https://bugzilla.suse.com/1158082", }, { category: "self", summary: "SUSE CVE CVE-2019-14895 page", url: "https://www.suse.com/security/cve/CVE-2019-14895/", }, { category: "self", summary: "SUSE CVE CVE-2019-15916 page", url: "https://www.suse.com/security/cve/CVE-2019-15916/", }, { category: "self", summary: "SUSE CVE CVE-2019-16231 page", url: "https://www.suse.com/security/cve/CVE-2019-16231/", }, { category: "self", summary: "SUSE CVE CVE-2019-17055 page", url: "https://www.suse.com/security/cve/CVE-2019-17055/", }, { category: "self", summary: "SUSE CVE CVE-2019-18660 page", url: "https://www.suse.com/security/cve/CVE-2019-18660/", }, { category: "self", summary: "SUSE CVE CVE-2019-18683 page", url: "https://www.suse.com/security/cve/CVE-2019-18683/", }, { category: "self", summary: "SUSE CVE CVE-2019-18805 page", url: "https://www.suse.com/security/cve/CVE-2019-18805/", }, { category: "self", summary: "SUSE CVE CVE-2019-18809 page", url: "https://www.suse.com/security/cve/CVE-2019-18809/", }, { category: "self", summary: "SUSE CVE CVE-2019-19049 page", url: "https://www.suse.com/security/cve/CVE-2019-19049/", }, { category: "self", summary: "SUSE CVE CVE-2019-19052 page", url: "https://www.suse.com/security/cve/CVE-2019-19052/", }, { category: "self", summary: "SUSE CVE CVE-2019-19056 page", url: "https://www.suse.com/security/cve/CVE-2019-19056/", }, { category: "self", summary: "SUSE CVE CVE-2019-19057 page", url: "https://www.suse.com/security/cve/CVE-2019-19057/", }, { category: "self", summary: "SUSE CVE CVE-2019-19058 page", url: "https://www.suse.com/security/cve/CVE-2019-19058/", }, { category: "self", summary: "SUSE CVE CVE-2019-19060 page", url: "https://www.suse.com/security/cve/CVE-2019-19060/", }, { category: "self", summary: "SUSE CVE CVE-2019-19062 page", url: "https://www.suse.com/security/cve/CVE-2019-19062/", }, { category: "self", summary: "SUSE CVE CVE-2019-19063 page", url: "https://www.suse.com/security/cve/CVE-2019-19063/", }, { category: "self", summary: "SUSE CVE CVE-2019-19065 page", url: "https://www.suse.com/security/cve/CVE-2019-19065/", }, { category: "self", summary: "SUSE CVE CVE-2019-19067 page", url: "https://www.suse.com/security/cve/CVE-2019-19067/", }, { category: "self", summary: "SUSE CVE CVE-2019-19068 page", url: "https://www.suse.com/security/cve/CVE-2019-19068/", }, { category: "self", summary: "SUSE CVE CVE-2019-19073 page", url: "https://www.suse.com/security/cve/CVE-2019-19073/", }, { category: "self", summary: "SUSE CVE CVE-2019-19074 page", url: "https://www.suse.com/security/cve/CVE-2019-19074/", }, { category: "self", summary: "SUSE CVE CVE-2019-19075 page", url: "https://www.suse.com/security/cve/CVE-2019-19075/", }, { category: "self", summary: "SUSE CVE CVE-2019-19077 page", url: "https://www.suse.com/security/cve/CVE-2019-19077/", }, { category: "self", summary: "SUSE CVE CVE-2019-19227 page", url: "https://www.suse.com/security/cve/CVE-2019-19227/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-12-20T06:23:44Z", generator: { date: "2019-12-20T06:23:44Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3371-1", initial_release_date: "2019-12-20T06:23:44Z", revision_history: [ { date: "2019-12-20T06:23:44Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.45.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-95.45.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.45.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-95.45.1.aarch64", product_id: "dlm-kmp-default-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.45.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-95.45.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.45.1.aarch64", product: { name: "kernel-default-4.12.14-95.45.1.aarch64", product_id: "kernel-default-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.45.1.aarch64", product: { name: "kernel-default-base-4.12.14-95.45.1.aarch64", product_id: "kernel-default-base-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.45.1.aarch64", product: { name: "kernel-default-devel-4.12.14-95.45.1.aarch64", product_id: "kernel-default-devel-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.45.1.aarch64", product: { name: "kernel-default-extra-4.12.14-95.45.1.aarch64", product_id: "kernel-default-extra-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-95.45.1.aarch64", product: { name: "kernel-default-kgraft-4.12.14-95.45.1.aarch64", product_id: "kernel-default-kgraft-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-95.45.1.aarch64", product: { name: "kernel-default-kgraft-devel-4.12.14-95.45.1.aarch64", product_id: "kernel-default-kgraft-devel-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.45.1.aarch64", product: { name: "kernel-obs-build-4.12.14-95.45.1.aarch64", product_id: "kernel-obs-build-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-95.45.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-95.45.1.aarch64", product_id: "kernel-obs-qa-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.45.1.aarch64", product: { name: "kernel-syms-4.12.14-95.45.1.aarch64", product_id: "kernel-syms-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-95.45.1.aarch64", product: { name: "kernel-vanilla-4.12.14-95.45.1.aarch64", product_id: "kernel-vanilla-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-95.45.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-95.45.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-95.45.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-95.45.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-95.45.1.aarch64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-95.45.1.aarch64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-95.45.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-95.45.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-95.45.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.45.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-95.45.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-95.45.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-95.45.1.noarch", product: { name: "kernel-devel-4.12.14-95.45.1.noarch", product_id: "kernel-devel-4.12.14-95.45.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-95.45.1.noarch", product: { name: "kernel-docs-4.12.14-95.45.1.noarch", product_id: "kernel-docs-4.12.14-95.45.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-95.45.1.noarch", product: { name: "kernel-docs-html-4.12.14-95.45.1.noarch", product_id: "kernel-docs-html-4.12.14-95.45.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-95.45.1.noarch", product: { name: "kernel-macros-4.12.14-95.45.1.noarch", product_id: "kernel-macros-4.12.14-95.45.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-95.45.1.noarch", product: { name: "kernel-source-4.12.14-95.45.1.noarch", product_id: "kernel-source-4.12.14-95.45.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-95.45.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-95.45.1.noarch", product_id: "kernel-source-vanilla-4.12.14-95.45.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.45.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-95.45.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.45.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-95.45.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-95.45.1.ppc64le", product: { name: "kernel-debug-4.12.14-95.45.1.ppc64le", product_id: "kernel-debug-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-95.45.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-95.45.1.ppc64le", product_id: "kernel-debug-base-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-95.45.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-95.45.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-95.45.1.ppc64le", product: { name: "kernel-debug-kgraft-devel-4.12.14-95.45.1.ppc64le", product_id: "kernel-debug-kgraft-devel-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.45.1.ppc64le", product: { name: "kernel-default-4.12.14-95.45.1.ppc64le", product_id: "kernel-default-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.45.1.ppc64le", product: { name: "kernel-default-base-4.12.14-95.45.1.ppc64le", product_id: "kernel-default-base-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.45.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-95.45.1.ppc64le", product_id: "kernel-default-devel-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.45.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-95.45.1.ppc64le", product_id: "kernel-default-extra-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-95.45.1.ppc64le", product: { name: "kernel-default-kgraft-4.12.14-95.45.1.ppc64le", product_id: "kernel-default-kgraft-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", product: { name: "kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", product_id: "kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.45.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-95.45.1.ppc64le", product_id: "kernel-obs-build-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-95.45.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-95.45.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.45.1.ppc64le", product: { name: "kernel-syms-4.12.14-95.45.1.ppc64le", product_id: "kernel-syms-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-95.45.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-95.45.1.ppc64le", product_id: "kernel-vanilla-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-95.45.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-95.45.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-95.45.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-95.45.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-95.45.1.ppc64le", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-95.45.1.ppc64le", product_id: "kernel-vanilla-kgraft-devel-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", product: { name: "kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", product_id: "kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-95.45.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-95.45.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-95.45.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.45.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-95.45.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.45.1.s390x", product: { name: "dlm-kmp-default-4.12.14-95.45.1.s390x", product_id: "dlm-kmp-default-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.45.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-95.45.1.s390x", product_id: "gfs2-kmp-default-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.45.1.s390x", product: { name: "kernel-default-4.12.14-95.45.1.s390x", product_id: "kernel-default-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.45.1.s390x", product: { name: "kernel-default-base-4.12.14-95.45.1.s390x", product_id: "kernel-default-base-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.45.1.s390x", product: { name: "kernel-default-devel-4.12.14-95.45.1.s390x", product_id: "kernel-default-devel-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.45.1.s390x", product: { name: "kernel-default-extra-4.12.14-95.45.1.s390x", product_id: "kernel-default-extra-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-95.45.1.s390x", product: { name: "kernel-default-kgraft-4.12.14-95.45.1.s390x", product_id: "kernel-default-kgraft-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-95.45.1.s390x", product: { name: "kernel-default-kgraft-devel-4.12.14-95.45.1.s390x", product_id: "kernel-default-kgraft-devel-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-95.45.1.s390x", product: { name: "kernel-default-man-4.12.14-95.45.1.s390x", product_id: "kernel-default-man-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.45.1.s390x", product: { name: "kernel-obs-build-4.12.14-95.45.1.s390x", product_id: "kernel-obs-build-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-95.45.1.s390x", product: { name: "kernel-obs-qa-4.12.14-95.45.1.s390x", product_id: "kernel-obs-qa-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.45.1.s390x", product: { name: "kernel-syms-4.12.14-95.45.1.s390x", product_id: "kernel-syms-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-95.45.1.s390x", product: { name: "kernel-vanilla-4.12.14-95.45.1.s390x", product_id: "kernel-vanilla-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-95.45.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-95.45.1.s390x", product_id: "kernel-vanilla-base-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-95.45.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-95.45.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-95.45.1.s390x", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-95.45.1.s390x", product_id: "kernel-vanilla-kgraft-devel-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-95.45.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-95.45.1.s390x", product_id: "kernel-zfcpdump-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-95.45.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-95.45.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-95.45.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-95.45.1.s390x", product_id: "kselftests-kmp-default-4.12.14-95.45.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.45.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-95.45.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-95.45.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.45.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-95.45.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.45.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-95.45.1.x86_64", product_id: "dlm-kmp-default-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.45.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-95.45.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-95.45.1.x86_64", product: { name: "kernel-debug-4.12.14-95.45.1.x86_64", product_id: "kernel-debug-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-95.45.1.x86_64", product: { name: "kernel-debug-base-4.12.14-95.45.1.x86_64", product_id: "kernel-debug-base-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-95.45.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-95.45.1.x86_64", product_id: "kernel-debug-devel-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-95.45.1.x86_64", product: { name: "kernel-debug-kgraft-devel-4.12.14-95.45.1.x86_64", product_id: "kernel-debug-kgraft-devel-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.45.1.x86_64", product: { name: "kernel-default-4.12.14-95.45.1.x86_64", product_id: "kernel-default-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.45.1.x86_64", product: { name: "kernel-default-base-4.12.14-95.45.1.x86_64", product_id: "kernel-default-base-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.45.1.x86_64", product: { name: "kernel-default-devel-4.12.14-95.45.1.x86_64", product_id: "kernel-default-devel-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.45.1.x86_64", product: { name: "kernel-default-extra-4.12.14-95.45.1.x86_64", product_id: "kernel-default-extra-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-95.45.1.x86_64", product: { name: "kernel-default-kgraft-4.12.14-95.45.1.x86_64", product_id: "kernel-default-kgraft-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", product: { name: "kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", product_id: "kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-95.45.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-95.45.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-95.45.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-95.45.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-95.45.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-95.45.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-kgraft-devel-4.12.14-95.45.1.x86_64", product: { name: "kernel-kvmsmall-kgraft-devel-4.12.14-95.45.1.x86_64", product_id: "kernel-kvmsmall-kgraft-devel-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.45.1.x86_64", product: { name: "kernel-obs-build-4.12.14-95.45.1.x86_64", product_id: "kernel-obs-build-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-95.45.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-95.45.1.x86_64", product_id: "kernel-obs-qa-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.45.1.x86_64", product: { name: "kernel-syms-4.12.14-95.45.1.x86_64", product_id: "kernel-syms-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-95.45.1.x86_64", product: { name: "kernel-vanilla-4.12.14-95.45.1.x86_64", product_id: "kernel-vanilla-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-95.45.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-95.45.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-95.45.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-95.45.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-95.45.1.x86_64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-95.45.1.x86_64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", product: { name: "kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", product_id: "kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-95.45.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-95.45.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-95.45.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.45.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-95.45.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-95.45.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP4", product: { name: "SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP4", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP4", product: { name: "SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4", product: { name: "SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP4", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-default-extra-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.45.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.45.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.45.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.45.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.45.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", }, product_reference: "kernel-source-4.12.14-95.45.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", }, product_reference: "kernel-default-kgraft-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-default-kgraft-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", }, product_reference: "kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", }, product_reference: "kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", }, product_reference: "kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-95.45.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", }, product_reference: "kernel-docs-4.12.14-95.45.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-95.45.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-95.45.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.45.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", }, product_reference: "kernel-default-4.12.14-95.45.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", }, product_reference: "kernel-default-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", }, product_reference: "kernel-default-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.45.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-95.45.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", }, product_reference: "kernel-default-base-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.45.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-95.45.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", }, product_reference: "kernel-default-man-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.45.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.45.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.45.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.45.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.45.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", }, product_reference: "kernel-source-4.12.14-95.45.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.45.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", }, product_reference: "kernel-syms-4.12.14-95.45.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", }, product_reference: "kernel-syms-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.45.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", }, product_reference: "kernel-default-4.12.14-95.45.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", }, product_reference: "kernel-default-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", }, product_reference: "kernel-default-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.45.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-95.45.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", }, product_reference: "kernel-default-base-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.45.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-95.45.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", }, product_reference: "kernel-default-man-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.45.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.45.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", }, product_reference: "kernel-source-4.12.14-95.45.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.45.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", }, product_reference: "kernel-syms-4.12.14-95.45.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-95.45.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.45.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", }, product_reference: "kernel-syms-4.12.14-95.45.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-95.45.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", }, product_reference: "kernel-default-extra-4.12.14-95.45.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2019-14895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14895", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14895", url: "https://www.suse.com/security/cve/CVE-2019-14895", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1157158 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157158", }, { category: "external", summary: "SUSE Bug 1173100 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173100", }, { category: "external", summary: "SUSE Bug 1173660 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "important", }, ], title: "CVE-2019-14895", }, { cve: "CVE-2019-15916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15916", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15916", url: "https://www.suse.com/security/cve/CVE-2019-15916", }, { category: "external", summary: "SUSE Bug 1149448 for CVE-2019-15916", url: "https://bugzilla.suse.com/1149448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "low", }, ], title: "CVE-2019-15916", }, { cve: "CVE-2019-16231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16231", }, ], notes: [ { category: "general", text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16231", url: "https://www.suse.com/security/cve/CVE-2019-16231", }, { category: "external", summary: "SUSE Bug 1150466 for CVE-2019-16231", url: "https://bugzilla.suse.com/1150466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "low", }, ], title: "CVE-2019-16231", }, { cve: "CVE-2019-17055", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17055", }, ], notes: [ { category: "general", text: "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17055", url: "https://www.suse.com/security/cve/CVE-2019-17055", }, { category: "external", summary: "SUSE Bug 1152782 for CVE-2019-17055", url: "https://bugzilla.suse.com/1152782", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "low", }, ], title: "CVE-2019-17055", }, { cve: "CVE-2019-18660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18660", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18660", url: "https://www.suse.com/security/cve/CVE-2019-18660", }, { category: "external", summary: "SUSE Bug 1157038 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157038", }, { category: "external", summary: "SUSE Bug 1157923 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-18660", }, { cve: "CVE-2019-18683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18683", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18683", url: "https://www.suse.com/security/cve/CVE-2019-18683", }, { category: "external", summary: "SUSE Bug 1155897 for CVE-2019-18683", url: "https://bugzilla.suse.com/1155897", }, { category: "external", summary: "SUSE Bug 1173868 for CVE-2019-18683", url: "https://bugzilla.suse.com/1173868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-18683", }, { cve: "CVE-2019-18805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18805", }, ], notes: [ { category: "general", text: "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18805", url: "https://www.suse.com/security/cve/CVE-2019-18805", }, { category: "external", summary: "SUSE Bug 1156187 for CVE-2019-18805", url: "https://bugzilla.suse.com/1156187", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "low", }, ], title: "CVE-2019-18805", }, { cve: "CVE-2019-18809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18809", }, ], notes: [ { category: "general", text: "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18809", url: "https://www.suse.com/security/cve/CVE-2019-18809", }, { category: "external", summary: "SUSE Bug 1156258 for CVE-2019-18809", url: "https://bugzilla.suse.com/1156258", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-18809", }, { cve: "CVE-2019-19049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19049", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19049", url: "https://www.suse.com/security/cve/CVE-2019-19049", }, { category: "external", summary: "SUSE Bug 1157173 for CVE-2019-19049", url: "https://bugzilla.suse.com/1157173", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19049", }, { cve: "CVE-2019-19052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19052", }, ], notes: [ { category: "general", text: "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19052", url: "https://www.suse.com/security/cve/CVE-2019-19052", }, { category: "external", summary: "SUSE Bug 1157324 for CVE-2019-19052", url: "https://bugzilla.suse.com/1157324", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19052", }, { cve: "CVE-2019-19056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19056", }, ], notes: [ { category: "general", text: "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19056", url: "https://www.suse.com/security/cve/CVE-2019-19056", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19056", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19057", }, ], notes: [ { category: "general", text: "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19057", url: "https://www.suse.com/security/cve/CVE-2019-19057", }, { category: "external", summary: "SUSE Bug 1157193 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157193", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "low", }, ], title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19058", }, ], notes: [ { category: "general", text: "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19058", url: "https://www.suse.com/security/cve/CVE-2019-19058", }, { category: "external", summary: "SUSE Bug 1157145 for CVE-2019-19058", url: "https://bugzilla.suse.com/1157145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19058", }, { cve: "CVE-2019-19060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19060", }, ], notes: [ { category: "general", text: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19060", url: "https://www.suse.com/security/cve/CVE-2019-19060", }, { category: "external", summary: "SUSE Bug 1157178 for CVE-2019-19060", url: "https://bugzilla.suse.com/1157178", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19060", }, { cve: "CVE-2019-19062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19062", }, ], notes: [ { category: "general", text: "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19062", url: "https://www.suse.com/security/cve/CVE-2019-19062", }, { category: "external", summary: "SUSE Bug 1157333 for CVE-2019-19062", url: "https://bugzilla.suse.com/1157333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19063", }, ], notes: [ { category: "general", text: "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19063", url: "https://www.suse.com/security/cve/CVE-2019-19063", }, { category: "external", summary: "SUSE Bug 1157298 for CVE-2019-19063", url: "https://bugzilla.suse.com/1157298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19063", }, { cve: "CVE-2019-19065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19065", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19065", url: "https://www.suse.com/security/cve/CVE-2019-19065", }, { category: "external", summary: "SUSE Bug 1157191 for CVE-2019-19065", url: "https://bugzilla.suse.com/1157191", }, { category: "external", summary: "SUSE Bug 1173961 for CVE-2019-19065", url: "https://bugzilla.suse.com/1173961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "important", }, ], title: "CVE-2019-19065", }, { cve: "CVE-2019-19067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19067", }, ], notes: [ { category: "general", text: "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19067", url: "https://www.suse.com/security/cve/CVE-2019-19067", }, { category: "external", summary: "SUSE Bug 1157180 for CVE-2019-19067", url: "https://bugzilla.suse.com/1157180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19068", }, ], notes: [ { category: "general", text: "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19068", url: "https://www.suse.com/security/cve/CVE-2019-19068", }, { category: "external", summary: "SUSE Bug 1157307 for CVE-2019-19068", url: "https://bugzilla.suse.com/1157307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19068", }, { cve: "CVE-2019-19073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19073", }, ], notes: [ { category: "general", text: "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19073", url: "https://www.suse.com/security/cve/CVE-2019-19073", }, { category: "external", summary: "SUSE Bug 1157070 for CVE-2019-19073", url: "https://bugzilla.suse.com/1157070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19074", }, ], notes: [ { category: "general", text: "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19074", url: "https://www.suse.com/security/cve/CVE-2019-19074", }, { category: "external", summary: "SUSE Bug 1157143 for CVE-2019-19074", url: "https://bugzilla.suse.com/1157143", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19075", }, ], notes: [ { category: "general", text: "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19075", url: "https://www.suse.com/security/cve/CVE-2019-19075", }, { category: "external", summary: "SUSE Bug 1157162 for CVE-2019-19075", url: "https://bugzilla.suse.com/1157162", }, { category: "external", summary: "SUSE Bug 1173958 for CVE-2019-19075", url: "https://bugzilla.suse.com/1173958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "low", }, ], title: "CVE-2019-19075", }, { cve: "CVE-2019-19077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19077", }, ], notes: [ { category: "general", text: "A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19077", url: "https://www.suse.com/security/cve/CVE-2019-19077", }, { category: "external", summary: "SUSE Bug 1157171 for CVE-2019-19077", url: "https://bugzilla.suse.com/1157171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19077", }, { cve: "CVE-2019-19227", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19227", }, ], notes: [ { category: "general", text: "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19227", url: "https://www.suse.com/security/cve/CVE-2019-19227", }, { category: "external", summary: "SUSE Bug 1157678 for CVE-2019-19227", url: "https://bugzilla.suse.com/1157678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.45.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.45.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:23:44Z", details: "moderate", }, ], title: "CVE-2019-19227", }, ], }
suse-su-2019:3372-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-15213: An issue was discovered in the Linux kernel, there was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).\n- CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).\n- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).\n- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).\n- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).\n- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).\n- CVE-2019-19528: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (bnc#1158407).\n- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).\n- CVE-2019-19529: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver (bnc#1158381).\n- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).\n- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).\n- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).\n- CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1156258).\n- CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure (bnc#1157304).\n- CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157032).\n- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).\n- CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157307).\n- CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157298).\n- CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel there was a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client (bnc#1157678).\n- CVE-2019-19081: A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157045).\n- CVE-2019-19080: Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157044).\n- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).\n- CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering copy to udata failures (bnc#1157171).\n- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).\n- CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures (bsc#1157180).\n- CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157178).\n- CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures (bsc#1157173).\n- CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures (bnc#1157162).\n- CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures (bnc#1157145).\n- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).\n- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function (bnc#1157070).\n- CVE-2019-19083: Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel allowed attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c (bnc#1157049).\n- CVE-2019-19082: Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel allowed attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c (bnc#1157046).\n- CVE-2019-15916: An issue was discovered in the Linux kernel There was a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service (bnc#1149448).\n- CVE-2019-0154: Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1135966).\n- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).\n- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).\n- CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket (bnc#1152782).\n\n\nThe following non-security bugs were fixed:\n\n- bnxt_en: Update firmware interface spec. to 1.10.0.47 (bsc#1157115)\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n- ACPI / hotplug / PCI: Allocate resources directly under the non-hotplug bridge (bsc#1111666).\n- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n- ALSA: 6fire: Drop the dead code (git-fixes).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- ALSA: hda/hdmi - Clear codec->relaxed_resume flag at unbinding (git-fixes).\n- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n- ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC (git-fixes).\n- ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop (git-fixes).\n- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n- ALSA: hda: Fix racy display power access (bsc#1156928).\n- ALSA: hda: hdmi - fix port numbering for ICL and TGL platforms (git-fixes).\n- ALSA: hda: hdmi - remove redundant code comments (git-fixes).\n- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n- ALSA: pcm: Yet another missing check of non-cached buffer type (bsc#1111666).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: usb-audio: Add skip_validation option (git-fixes).\n- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n- ALSA: usb-audio: Fix NULL dereference at parsing BADD (git-fixes).\n- ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk() (git-fixes).\n- ALSA: usb-audio: Fix incorrect size check for processing/extension units (git-fixes).\n- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n- ALSA: usb-audio: sound: usb: usb true/false for bool return type (git-fixes).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n- Bluetooth: delete a stray unlock (bsc#1051510).\n- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n- Btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n- CIFS: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n- CIFS: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n- CIFS: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n- CIFS: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n- CIFS: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n- CIFS: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n- CIFS: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n- CIFS: fix max ea value size (bsc#1144333, bsc#1154355).\n- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n- HID: Fix assumption that devices have inputs (git-fixes).\n- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- IB/mlx5: Free mpi in mp_slave mode (bsc#1103991).\n- IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command (bsc#1103991).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n- KVM: s390: fix __insn32_query() inline assembly (git-fixes).\n- KVM: s390: vsie: Do not shadow CRYCB when no AP and no keys (git-fixes).\n- KVM: s390: vsie: Return correct values for Invalid CRYCB format (git-fixes).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).\n- NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n- PCI/PM: Clear PCIe PME Status even for legacy power management (bsc#1111666).\n- PCI/PME: Fix possible use-after-free on remove (git-fixes).\n- PCI/PTM: Remove spurious 'd' from granularity message (bsc#1051510).\n- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n- PCI: pciehp: Do not disable interrupt twice on suspend (bsc#1111666).\n- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n- PCI: tegra: Enable Relaxed Ordering only for Tegra20 and Tegra30 (git-fixes).\n- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n- PM / devfreq: passive: fix compiler warning (bsc#1051510).\n- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n- RDMA/bnxt_re: Fix stat push into dma buffer on gen p5 devices (bsc#1157115)\n- RDMA/efa: Add Amazon EFA driver (jsc#SLE-4805)\n- RDMA/efa: Clear the admin command buffer prior to its submission (git-fixes) Patch was already picked through Amazon driver repo but was not marked with a Git-commit tag\n- RDMA/hns: Fix comparison of unsigned long variable 'end' with less than zero (bsc#1104427 bsc#1137236).\n- RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 ).\n- RDMA/restrack: Track driver QP types in resource tracker (jsc#SLE-4805)\n- README.BRANCH: Removing myself from the maintainer list\n- UAS: Revert commit 3ae62a42090f ('UAS: fix alignment of scatter/gather segments').\n- USB: chaoskey: fix error case of a timeout (git-fixes).\n- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- USB: ldusb: fix control-message timeout (bsc#1051510).\n- USB: ldusb: fix ring-buffer locking (bsc#1051510).\n- USB: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n- USB: serial: mos7720: fix remote wakeup (git-fixes).\n- USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n- USB: serial: mos7840: fix remote wakeup (git-fixes).\n- USB: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n- USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- USBIP: add config dependency for SGL_ALLOC (git-fixes).\n- acpi/nfit, device-dax: Identify differentiated memory with a unique numa-node (bsc#1158071).\n- appledisplay: fix error handling in the scheduled work (git-fixes).\n- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n- ata: ep93xx: Use proper enums for directions (bsc#1051510).\n- ath10k: Correct error handling of dma_map_single() (bsc#1111666).\n- ath10k: allocate small size dma memory in ath10k_pci_diag_write_mem (bsc#1111666).\n- ath10k: assign 'n_cipher_suites = 11' for WCN3990 to enable WPA3 (bsc#1111666).\n- ath10k: avoid possible memory access violation (bsc#1111666).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: fix vdev-start timeout on error (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: skip resetting rx filter for WCN3990 (bsc#1111666).\n- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- ath9k_hw: fix uninitialized variable data (bsc#1051510).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n- bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands (bsc#1104745).\n- bnxt_en: Update firmware interface spec. to 1.10.0.89 (bsc#1157115)\n- bnxt_en: Update firmware interface to 1.10.0.69 (bsc#1157115)\n- bpf: Fix use after free in subprog's jited symbol removal (bsc#1109837).\n- bpf: fix BTF limits (bsc#1109837).\n- bpf: fix BTF verification of enums (bsc#1109837).\n- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n- brcmfmac: fix wrong strnchr usage (bsc#1111666).\n- brcmfmac: increase buffer for obtaining firmware capabilities (bsc#1111666).\n- brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n- brcmsmac: Use kvmalloc() for ucode allocations (bsc#1111666).\n- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n- cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n- cfg80211: validate wmm rule when setting (bsc#1111666).\n- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).\n- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n- cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).\n- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n- cpupower: Fix coredump on VMWare (bsc#1051510).\n- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n- crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127354 bsc#1127371).\n- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n- dlm: do not leak kernel pointer to userspace (bsc#1051510).\n- dlm: fix invalid free (bsc#1051510).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n- docs: move protection-keys.rst to the core-api book (bsc#1078248).\n- drm/amd/display: fix odm combine pipe reset (bsc#1111666).\n- drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported (bsc#1113956)\n- drm/amdgpu/powerplay/vega10: allow undervolting in p7 (bsc#1111666).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1111666).\n- drm/amdgpu: fix memory leak (bsc#1111666).\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/cml: Add second PCH ID for CMP (bsc#1111666).\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915/gvt: fix dropping obj reference twice (bsc#1111666).\n- drm/i915/ilk: Fix warning when reading emon_status with no output (bsc#1111666).\n- drm/i915/pmu: 'Frequency' is reported as accumulated cycles (bsc#1112178)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915: Do not dereference request if it may have been retired when (bsc#1142635)\n- drm/i915: Fix and improve MCR selection logic (bsc#1112178)\n- drm/i915: Lock the engine while dumping the active request (bsc#1142635)\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Reacquire priolist cache after dropping the engine lock (bsc#1129770)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Skip modeset for cdclk changes if possible (bsc#1156928).\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/msm/dpu: handle failures while initializing displays (bsc#1111666).\n- drm/msm: fix memleak on release (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- drm: fix module name in edid_firmware log message (bsc#1113956)\n- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n- e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n- ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable (bsc#1158646).\n- ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either (bsc#1158647).\n- ext4: fix punch hole for inline_data file systems (bsc#1158640).\n- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n- fix SCTP regression (bsc#1158082)\n- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n- hypfs: Fix error number left in struct pointer member (bsc#1051510).\n- i2c: of: Try to find an I2C adapter matching the parent (bsc#1129770)\n- i40e: enable X710 support (bsc#1151067).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ice: fix potential infinite loop because loop counter being too small (bsc#1118661).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n- intel_th: Fix a double put_device() in error path (git-fixes).\n- iomap: Fix pipe page leakage during splicing (bsc#1158651).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).\n- irqdomain: Add the missing assignment of domain->fwnode for named fwnode (bsc#1111666).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: check kasprintf() return value (bsc#1051510).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- iwlwifi: drop packets with bad status in CD (bsc#1111666).\n- iwlwifi: exclude GEO SAR support for 3168 (bsc#1111666).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- iwlwifi: fw: do not send GEO_TX_POWER_LIMIT command to FW version 36 (bsc#1111666).\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n- iwlwifi: mvm: use correct FIFO length (bsc#1111666).\n- iwlwifi: pcie: fit reclaim msg to MAX_MSG_LEN (bsc#1111666).\n- iwlwifi: pcie: read correct prph address for newer devices (bsc#1111666).\n- ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 ).\n- ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 ).\n- kABI fixup alloc_dax_region (bsc#1158071).\n- kABI workaround for ath10k hw_filter_reset_required field (bsc#1111666).\n- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for iwlwifi iwl_rx_cmd_buffer change (bsc#1111666).\n- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n- kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).\n- kabi protect enum RDMA_DRIVER_EFA (jsc#SLE-4805)\n- kabi: s390: struct subchannel (git-fixes).\n- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n- libnvdimm: Export the target_node attribute for regions and namespaces (bsc#1158071).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n- livepatch: Basic API to track system state changes (bsc#1071995 ).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n- loop: add ioctl for changing logical block size (bsc#1108043).\n- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n- lpfc: size cpu map by last cpu id set (bsc#1157160).\n- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n- macvlan: schedule bc_work even if error (bsc#1051510).\n- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: bdisp: fix memleak on release (git-fixes).\n- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n- media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n- media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).\n- media: radio: wl1273: fix interrupt masking on release (git-fixes).\n- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n- media: vim2m: Fix abort issue (git-fixes).\n- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n- mei: fix modalias documentation (git-fixes).\n- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n- mlxsw: spectrum_flower: Fail in case user specifies multiple mirror actions (bsc#1112374).\n- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).\n- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n- mmc: core: fix wl1251 sdio quirks (git-fixes).\n- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdio: fix wl1251 vendor id (git-fixes).\n- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n- mt76x0: init hw capabilities.\n- mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n- mwifex: free rx_cmd skb in suspended state (bsc#1111666).\n- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n- mwifiex: do no submit URB in suspended state (bsc#1111666).\n- nbd: prevent memory leak (bsc#1158638).\n- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n- net/mlx5: FWTrace, Reduce stack usage (bsc#1103990).\n- net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 ).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 ).\n- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n- net/mlx5e: Print a warning when LRO feature is dropped or not allowed (bsc#1103990).\n- net/sched: cbs: Fix not adding cbs instance to list (bsc#1109837).\n- net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate (bsc#1109837).\n- net/smc: Fix error path in smc_init (git-fixes).\n- net/smc: avoid fallback in case of non-blocking connect (git-fixes).\n- net/smc: do not schedule tx_work in SMC_CLOSED state (git-fixes).\n- net/smc: fix SMCD link group creation with VLAN id (git-fixes).\n- net/smc: fix closing of fallback SMC sockets (git-fixes).\n- net/smc: fix ethernet interface refcounting (git-fixes).\n- net/smc: fix fastopen for non-blocking connect() (git-fixes).\n- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).\n- net/smc: fix refcounting for non-blocking connect() (git-fixes).\n- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).\n- net/smc: original socket family in inet_sock_diag (git-fixes).\n- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).\n- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n- net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).\n- net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).\n- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n- net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).\n- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n- net: dsa: fix switch tree list (networking-stable-19_11_05).\n- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n- net: hns3: change GFP flag during lock period (bsc#1104353 ).\n- net: hns3: do not query unsupported commands in debugfs (bsc#1104353).\n- net: hns3: fix GFP flag error in hclge_mac_update_stats() (bsc#1126390).\n- net: hns3: fix some reset handshake issue (bsc#1104353 ).\n- net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353 bsc#1134983).\n- net: hns: Fix the stray netpoll locks causing deadlock in NAPI path (bsc#1104353).\n- net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 ).\n- net: phylink: Fix flow control resolution (bsc#1119113 ).\n- net: sched: cbs: Avoid division by zero when calculating the port rate (bsc#1109837).\n- net: sched: fix possible crash in tcf_action_destroy() (bsc#1109837).\n- net: sched: fix reordering issues (bsc#1109837).\n- net: sock_map, fix missing ulp check in sock hash case (bsc#1109837).\n- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n- nfc: netlink: fix double device reference drop (git-fixes).\n- nfc: port100: handle command failure cleanly (git-fixes).\n- nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs (bsc#1109837).\n- nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs (bsc#1109837).\n- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n- nvme-tcp: support C2HData with SUCCESS flag (bsc#1157386).\n- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n- ocfs2: fix passing zero to 'PTR_ERR' warning (bsc#1158649).\n- openvswitch: fix flow command message size (git-fixes).\n- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n- perf/x86/amd: Change/fix NMI latency mitigation to use a timestamp (bsc#1142924).\n- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n- phylink: fix kernel-doc warnings (bsc#1111666).\n- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).\n- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n- powerpc/bpf: Fix tail call implementation (bsc#1157698).\n- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n- printk: Export console_printk (bsc#1071995).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n- qxl: fix null-pointer crash during suspend (bsc#1111666).\n- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).\n- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n- rt2800: remove errornous duplicate condition (git-fixes).\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n- rtlwifi: btcoex: Use proper enumerated types for Wi-Fi only interface (bsc#1111666).\n- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n- s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n- s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n- s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n- s390/cio: fix virtio-ccw DMA without PV (git-fixes).\n- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n- s390/idle: fix cpu idle time calculation (bsc#1051510).\n- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n- s390/process: avoid potential reading of freed stack (bsc#1051510).\n- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n- s390/qeth: return proper errno on IO error (bsc#1051510).\n- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n- s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n- s390/zcrypt: fix memleak at release (git-fixes).\n- s390: fix stfle zero padding (bsc#1051510).\n- s390: vsie: Use effective CRYCBD.31 to check CRYCBD validity (git-fixes).\n- sc16is7xx: Fix for 'Unexpected interrupt: 8' (bsc#1051510).\n- scsi: lpfc: Add enablement of multiple adapter dumps (bsc#1154601).\n- scsi: lpfc: Add registration for CPU Offline/Online events (bsc#1154601).\n- scsi: lpfc: Change default IRQ model on AMD architectures (bsc#1154601).\n- scsi: lpfc: Clarify FAWNN error message (bsc#1154601).\n- scsi: lpfc: Fix NULL check before mempool_destroy is not needed (bsc#1154601).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_get_sgl_per_hdwq() (bsc#1154601).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_sli4_enable_intr() (bsc#1154601).\n- scsi: lpfc: Fix configuration of BB credit recovery in service parameters (bsc#1154601).\n- scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow (bsc#1154601).\n- scsi: lpfc: Fix dynamic fw log enablement check (bsc#1154601).\n- scsi: lpfc: Fix kernel crash at lpfc_nvme_info_show during remote port bounce (bsc#1154601).\n- scsi: lpfc: Fix lpfc_cpumask_of_node_init() (bsc#1154601).\n- scsi: lpfc: Fix unexpected error messages during RSCN handling (bsc#1154601).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1154601).\n- scsi: lpfc: Initialize cpu_map for not present cpus (bsc#1154601).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: lpfc: Make lpfc_debugfs_ras_log_data static (bsc#1154601).\n- scsi: lpfc: Mitigate high memory pre-allocation by SCSI-MQ (bsc#1154601).\n- scsi: lpfc: Raise config max for lpfc_fcp_mq_threshold variable (bsc#1154601).\n- scsi: lpfc: Sync with FC-NVMe-2 SLER change to require Conf with SLER (bsc#1154601).\n- scsi: lpfc: Update lpfc version to 12.6.0.1 (bsc#1154601).\n- scsi: lpfc: Update lpfc version to 12.6.0.2 (bsc#1154601).\n- scsi: lpfc: fix build error of lpfc_debugfs.c for vfree/vmalloc (bsc#1154601).\n- scsi: lpfc: fix inlining of lpfc_sli4_cleanup_poll_list() (bsc#1154601).\n- scsi: lpfc: fix spelling error in MAGIC_NUMER_xxx (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_get_scsi_buf_s3(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: lpfc_attr: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: lpfc_nvmet: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: revise nvme max queues to be hdwq count (bsc#1154601).\n- scsi: lpfc: use hdwq assigned cpu for allocation (bsc#1157160).\n- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Use correct number of vectors for online CPUs (bsc#1137223).\n- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: Fix use-after-free Read in slip_open (bsc#1051510).\n- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n- smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).\n- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- spi: atmel: Fix CS high support (bsc#1051510).\n- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n- spi: spidev: Fix OF tree warning logic (bsc#1051510).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- supported.conf:\n- synclink_gt(): fix compat_ioctl() (bsc#1051510).\n- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: check msg->req data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n- tipc: compat: allow tipc commands without arguments (bsc#1051510).\n- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n- tipc: handle the err returned from cmd header function (bsc#1051510).\n- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n- tipc: tipc clang warning (bsc#1051510).\n- tools/power/x86/intel-speed-select: Fix a read overflow in isst_set_tdp_level_msr() (bsc#1111666).\n- tools: bpftool: fix arguments for p_err() in do_event_pipe() (bsc#1109837).\n- tpm: add check after commands attribs tab allocation (bsc#1051510).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: msm_serial: Fix flow control (bsc#1051510).\n- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n- tun: fix data-race in gro_normal_list() (bsc#1111666).\n- ubifs: Correctly initialize c->min_log_bytes (bsc#1158641).\n- ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 ('usb-storage: Set virt_boundary_mask to avoid SG overflows') (bsc#1051510).\n- usb: chipidea: Fix otg event handler (bsc#1051510).\n- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- usb: handle warm-reset port requests on hub resume (bsc#1051510).\n- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- usbip: Fix free of unallocated memory in vhci tx (git-fixes).\n- usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n- usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n- video/hdmi: Fix AVI bar unpack (git-fixes).\n- virtio/s390: fix race on airq_areas (bsc#1051510).\n- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n- virtio_ring: fix return code on DMA mapping fails (git-fixes).\n- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n- watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n- wil6210: drop Rx multicast packets that are looped-back to STA (bsc#1111666).\n- wil6210: fix L2 RX status handling (bsc#1111666).\n- wil6210: fix RGF_CAF_ICR address for Talyn-MB (bsc#1111666).\n- wil6210: fix debugfs memory access alignment (bsc#1111666).\n- wil6210: fix freeing of rx buffers in EDMA mode (bsc#1111666).\n- wil6210: fix invalid memory access for rx_buff_mgmt debugfs (bsc#1111666).\n- wil6210: fix locking in wmi_call (bsc#1111666).\n- wil6210: prevent usage of tx ring 0 for eDMA (bsc#1111666).\n- wil6210: set edma variables only for Talyn-MB devices (bsc#1111666).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n- x86/pkeys: Update documentation about availability (bsc#1078248).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n- xfrm: Fix xfrm sel prefix length validation (git-fixes).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n- xsk: Fix registration of Rx-only sockets (bsc#1109837).\n- xsk: relax UMEM headroom alignment (bsc#1109837).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-3372,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-3372", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3372-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:3372-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:3372-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html", }, { category: "self", summary: "SUSE Bug 1048942", url: "https://bugzilla.suse.com/1048942", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1082635", url: "https://bugzilla.suse.com/1082635", }, { category: "self", summary: "SUSE Bug 1089644", url: "https://bugzilla.suse.com/1089644", }, { category: "self", summary: "SUSE Bug 1091041", url: "https://bugzilla.suse.com/1091041", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103991", url: "https://bugzilla.suse.com/1103991", }, { category: "self", summary: "SUSE Bug 1104353", url: "https://bugzilla.suse.com/1104353", }, { category: "self", summary: "SUSE Bug 1104427", url: "https://bugzilla.suse.com/1104427", }, { category: "self", summary: "SUSE Bug 1104745", url: "https://bugzilla.suse.com/1104745", }, { category: "self", summary: "SUSE Bug 1108043", url: "https://bugzilla.suse.com/1108043", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1111666", url: "https://bugzilla.suse.com/1111666", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1113956", url: "https://bugzilla.suse.com/1113956", }, { category: "self", summary: "SUSE Bug 1113994", url: "https://bugzilla.suse.com/1113994", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1117169", url: "https://bugzilla.suse.com/1117169", }, { category: "self", summary: "SUSE Bug 1118661", url: "https://bugzilla.suse.com/1118661", }, { category: "self", summary: "SUSE Bug 1119113", url: "https://bugzilla.suse.com/1119113", }, { category: "self", summary: "SUSE Bug 1120853", url: "https://bugzilla.suse.com/1120853", }, { category: "self", summary: "SUSE Bug 1126390", url: "https://bugzilla.suse.com/1126390", }, { category: "self", summary: "SUSE Bug 1127354", url: "https://bugzilla.suse.com/1127354", }, { category: "self", summary: "SUSE Bug 1127371", url: "https://bugzilla.suse.com/1127371", }, { category: "self", summary: "SUSE Bug 1129770", url: "https://bugzilla.suse.com/1129770", }, { category: "self", summary: "SUSE Bug 1131107", url: "https://bugzilla.suse.com/1131107", }, { category: "self", summary: "SUSE Bug 1134983", url: "https://bugzilla.suse.com/1134983", }, { category: "self", summary: "SUSE Bug 1135966", url: "https://bugzilla.suse.com/1135966", }, { category: "self", summary: "SUSE Bug 1135967", url: "https://bugzilla.suse.com/1135967", }, { category: "self", summary: "SUSE Bug 1137223", url: "https://bugzilla.suse.com/1137223", }, { category: "self", summary: "SUSE Bug 1137236", url: "https://bugzilla.suse.com/1137236", }, { category: "self", summary: "SUSE Bug 1138039", url: "https://bugzilla.suse.com/1138039", }, { category: "self", summary: "SUSE Bug 1140948", url: "https://bugzilla.suse.com/1140948", }, { category: "self", summary: "SUSE Bug 1142095", url: "https://bugzilla.suse.com/1142095", }, { category: "self", summary: "SUSE Bug 1142635", url: "https://bugzilla.suse.com/1142635", }, { category: "self", summary: "SUSE Bug 1142924", url: "https://bugzilla.suse.com/1142924", }, { category: "self", summary: "SUSE Bug 1143706", url: "https://bugzilla.suse.com/1143706", }, { category: "self", summary: "SUSE Bug 1144333", url: "https://bugzilla.suse.com/1144333", }, { category: "self", summary: "SUSE Bug 1146544", url: "https://bugzilla.suse.com/1146544", }, { category: "self", summary: "SUSE Bug 1149448", url: "https://bugzilla.suse.com/1149448", }, { category: "self", summary: "SUSE Bug 1150466", url: "https://bugzilla.suse.com/1150466", }, { category: "self", summary: "SUSE Bug 1151067", url: "https://bugzilla.suse.com/1151067", }, { category: "self", summary: "SUSE Bug 1151548", url: "https://bugzilla.suse.com/1151548", }, { category: "self", summary: "SUSE Bug 1151900", url: "https://bugzilla.suse.com/1151900", }, { category: "self", summary: "SUSE Bug 1152782", url: "https://bugzilla.suse.com/1152782", }, { category: "self", summary: "SUSE Bug 1153628", url: "https://bugzilla.suse.com/1153628", }, { category: "self", summary: "SUSE Bug 1153811", url: "https://bugzilla.suse.com/1153811", }, { category: "self", summary: "SUSE Bug 1154043", url: "https://bugzilla.suse.com/1154043", }, { category: "self", summary: "SUSE Bug 1154058", url: "https://bugzilla.suse.com/1154058", }, { category: "self", summary: "SUSE Bug 1154124", url: "https://bugzilla.suse.com/1154124", }, { category: "self", summary: "SUSE Bug 1154355", url: "https://bugzilla.suse.com/1154355", }, { category: "self", summary: "SUSE Bug 1154526", url: "https://bugzilla.suse.com/1154526", }, { category: "self", summary: "SUSE Bug 1154601", url: "https://bugzilla.suse.com/1154601", }, { category: "self", summary: "SUSE Bug 1155021", url: "https://bugzilla.suse.com/1155021", }, { category: "self", summary: "SUSE Bug 1155689", url: "https://bugzilla.suse.com/1155689", }, { category: "self", summary: "SUSE Bug 1155692", url: "https://bugzilla.suse.com/1155692", }, { category: "self", summary: "SUSE Bug 1155836", url: "https://bugzilla.suse.com/1155836", }, { category: "self", summary: "SUSE Bug 1155897", url: "https://bugzilla.suse.com/1155897", }, { category: "self", summary: "SUSE Bug 1155921", url: "https://bugzilla.suse.com/1155921", }, { category: "self", summary: "SUSE Bug 1156187", url: "https://bugzilla.suse.com/1156187", }, { category: "self", summary: "SUSE Bug 1156258", url: "https://bugzilla.suse.com/1156258", }, { category: "self", summary: "SUSE Bug 1156429", url: "https://bugzilla.suse.com/1156429", }, { category: "self", summary: "SUSE Bug 1156466", url: "https://bugzilla.suse.com/1156466", }, { category: "self", summary: "SUSE Bug 1156471", url: "https://bugzilla.suse.com/1156471", }, { category: "self", summary: "SUSE Bug 1156494", url: "https://bugzilla.suse.com/1156494", }, { category: "self", summary: "SUSE Bug 1156609", url: "https://bugzilla.suse.com/1156609", }, { category: "self", summary: "SUSE Bug 1156700", url: "https://bugzilla.suse.com/1156700", }, { category: "self", summary: "SUSE Bug 1156729", url: "https://bugzilla.suse.com/1156729", }, { category: "self", summary: "SUSE Bug 1156882", url: "https://bugzilla.suse.com/1156882", }, { category: "self", summary: "SUSE Bug 1156928", url: "https://bugzilla.suse.com/1156928", }, { category: "self", summary: "SUSE Bug 1157032", url: "https://bugzilla.suse.com/1157032", }, { category: "self", summary: "SUSE Bug 1157038", url: "https://bugzilla.suse.com/1157038", }, { category: "self", summary: "SUSE Bug 1157042", url: "https://bugzilla.suse.com/1157042", }, { category: "self", summary: "SUSE Bug 1157044", url: "https://bugzilla.suse.com/1157044", }, { category: "self", summary: "SUSE Bug 1157045", url: "https://bugzilla.suse.com/1157045", }, { category: "self", summary: "SUSE Bug 1157046", url: "https://bugzilla.suse.com/1157046", }, { category: "self", summary: "SUSE Bug 1157049", url: "https://bugzilla.suse.com/1157049", }, { category: "self", summary: "SUSE Bug 1157070", url: "https://bugzilla.suse.com/1157070", }, { category: "self", summary: "SUSE Bug 1157115", url: "https://bugzilla.suse.com/1157115", }, { category: "self", summary: "SUSE Bug 1157143", url: "https://bugzilla.suse.com/1157143", }, { category: "self", summary: "SUSE Bug 1157145", url: "https://bugzilla.suse.com/1157145", }, { category: "self", summary: "SUSE Bug 1157158", url: "https://bugzilla.suse.com/1157158", }, { category: "self", summary: "SUSE Bug 1157160", url: "https://bugzilla.suse.com/1157160", }, { category: "self", summary: "SUSE Bug 1157162", url: "https://bugzilla.suse.com/1157162", }, { category: "self", summary: "SUSE Bug 1157171", url: "https://bugzilla.suse.com/1157171", }, { category: "self", summary: "SUSE Bug 1157173", url: "https://bugzilla.suse.com/1157173", }, { category: "self", summary: "SUSE Bug 1157178", url: "https://bugzilla.suse.com/1157178", }, { category: "self", summary: "SUSE Bug 1157180", url: "https://bugzilla.suse.com/1157180", }, { category: "self", summary: "SUSE Bug 1157182", url: "https://bugzilla.suse.com/1157182", }, { category: "self", summary: "SUSE Bug 1157183", url: "https://bugzilla.suse.com/1157183", }, { category: "self", summary: "SUSE Bug 1157184", url: "https://bugzilla.suse.com/1157184", }, { category: "self", summary: "SUSE Bug 1157191", url: "https://bugzilla.suse.com/1157191", }, { category: "self", summary: "SUSE Bug 1157193", url: "https://bugzilla.suse.com/1157193", }, { category: "self", summary: "SUSE Bug 1157197", url: "https://bugzilla.suse.com/1157197", }, { category: "self", summary: "SUSE Bug 1157298", url: "https://bugzilla.suse.com/1157298", }, { category: "self", summary: "SUSE Bug 1157304", url: "https://bugzilla.suse.com/1157304", }, { category: "self", summary: "SUSE Bug 1157307", url: "https://bugzilla.suse.com/1157307", }, { category: "self", summary: "SUSE Bug 1157324", url: "https://bugzilla.suse.com/1157324", }, { category: "self", summary: "SUSE Bug 1157333", url: "https://bugzilla.suse.com/1157333", }, { category: "self", summary: "SUSE Bug 1157386", url: "https://bugzilla.suse.com/1157386", }, { category: "self", summary: "SUSE Bug 1157424", url: "https://bugzilla.suse.com/1157424", }, { category: "self", summary: "SUSE Bug 1157463", url: "https://bugzilla.suse.com/1157463", }, { category: "self", summary: "SUSE Bug 1157499", url: "https://bugzilla.suse.com/1157499", }, { category: "self", summary: "SUSE Bug 1157678", url: "https://bugzilla.suse.com/1157678", }, { category: "self", summary: "SUSE Bug 1157698", url: "https://bugzilla.suse.com/1157698", }, { category: "self", summary: "SUSE Bug 1157778", url: "https://bugzilla.suse.com/1157778", }, { category: "self", summary: "SUSE Bug 1157908", url: "https://bugzilla.suse.com/1157908", }, { category: "self", summary: "SUSE Bug 1158049", url: "https://bugzilla.suse.com/1158049", }, { category: "self", summary: "SUSE Bug 1158063", url: "https://bugzilla.suse.com/1158063", }, { category: "self", summary: "SUSE Bug 1158064", url: "https://bugzilla.suse.com/1158064", }, { category: "self", summary: "SUSE Bug 1158065", url: "https://bugzilla.suse.com/1158065", }, { category: "self", summary: "SUSE Bug 1158066", url: "https://bugzilla.suse.com/1158066", }, { category: "self", summary: "SUSE Bug 1158067", url: "https://bugzilla.suse.com/1158067", }, { category: "self", summary: "SUSE Bug 1158068", url: "https://bugzilla.suse.com/1158068", }, { category: "self", summary: "SUSE Bug 1158071", url: "https://bugzilla.suse.com/1158071", }, { category: "self", summary: "SUSE Bug 1158082", url: "https://bugzilla.suse.com/1158082", }, { category: "self", summary: "SUSE Bug 1158381", url: "https://bugzilla.suse.com/1158381", }, { category: "self", summary: "SUSE Bug 1158394", url: "https://bugzilla.suse.com/1158394", }, { category: "self", summary: "SUSE Bug 1158398", url: "https://bugzilla.suse.com/1158398", }, { category: "self", summary: "SUSE Bug 1158407", url: "https://bugzilla.suse.com/1158407", }, { category: "self", summary: "SUSE Bug 1158410", url: "https://bugzilla.suse.com/1158410", }, { category: "self", summary: "SUSE Bug 1158413", url: "https://bugzilla.suse.com/1158413", }, { category: "self", summary: "SUSE Bug 1158417", url: "https://bugzilla.suse.com/1158417", }, { category: "self", summary: "SUSE Bug 1158427", url: "https://bugzilla.suse.com/1158427", }, { category: "self", summary: "SUSE Bug 1158445", url: "https://bugzilla.suse.com/1158445", }, { category: "self", summary: "SUSE Bug 1158637", url: "https://bugzilla.suse.com/1158637", }, { category: "self", summary: "SUSE Bug 1158638", url: "https://bugzilla.suse.com/1158638", }, { category: "self", summary: "SUSE Bug 1158639", url: "https://bugzilla.suse.com/1158639", }, { category: "self", summary: "SUSE Bug 1158640", url: "https://bugzilla.suse.com/1158640", }, { category: "self", summary: "SUSE Bug 1158641", url: "https://bugzilla.suse.com/1158641", }, { category: "self", summary: "SUSE Bug 1158643", url: "https://bugzilla.suse.com/1158643", }, { category: "self", summary: "SUSE Bug 1158644", url: "https://bugzilla.suse.com/1158644", }, { category: "self", summary: "SUSE Bug 1158645", url: "https://bugzilla.suse.com/1158645", }, { category: "self", summary: "SUSE Bug 1158646", url: "https://bugzilla.suse.com/1158646", }, { category: "self", summary: "SUSE Bug 1158647", url: "https://bugzilla.suse.com/1158647", }, { category: "self", summary: "SUSE Bug 1158649", url: "https://bugzilla.suse.com/1158649", }, { category: "self", summary: "SUSE Bug 1158651", url: "https://bugzilla.suse.com/1158651", }, { category: "self", summary: "SUSE Bug 1158652", url: "https://bugzilla.suse.com/1158652", }, { category: "self", summary: "SUSE CVE CVE-2019-0154 page", url: "https://www.suse.com/security/cve/CVE-2019-0154/", }, { category: "self", summary: "SUSE CVE CVE-2019-14895 page", url: "https://www.suse.com/security/cve/CVE-2019-14895/", }, { category: "self", summary: "SUSE CVE CVE-2019-14901 page", url: "https://www.suse.com/security/cve/CVE-2019-14901/", }, { category: "self", summary: "SUSE CVE CVE-2019-15213 page", url: "https://www.suse.com/security/cve/CVE-2019-15213/", }, { category: "self", summary: "SUSE CVE CVE-2019-15916 page", url: "https://www.suse.com/security/cve/CVE-2019-15916/", }, { category: "self", summary: "SUSE CVE CVE-2019-16231 page", url: "https://www.suse.com/security/cve/CVE-2019-16231/", }, { category: "self", summary: "SUSE CVE CVE-2019-17055 page", url: "https://www.suse.com/security/cve/CVE-2019-17055/", }, { category: "self", summary: "SUSE CVE CVE-2019-18660 page", url: "https://www.suse.com/security/cve/CVE-2019-18660/", }, { category: "self", summary: "SUSE CVE CVE-2019-18683 page", url: "https://www.suse.com/security/cve/CVE-2019-18683/", }, { category: "self", summary: "SUSE CVE CVE-2019-18805 page", url: "https://www.suse.com/security/cve/CVE-2019-18805/", }, { category: "self", summary: "SUSE CVE CVE-2019-18809 page", url: "https://www.suse.com/security/cve/CVE-2019-18809/", }, { category: "self", summary: "SUSE CVE CVE-2019-19046 page", url: "https://www.suse.com/security/cve/CVE-2019-19046/", }, { category: "self", summary: "SUSE CVE CVE-2019-19049 page", url: "https://www.suse.com/security/cve/CVE-2019-19049/", }, { category: "self", summary: "SUSE CVE CVE-2019-19052 page", url: "https://www.suse.com/security/cve/CVE-2019-19052/", }, { category: "self", summary: "SUSE CVE CVE-2019-19056 page", url: "https://www.suse.com/security/cve/CVE-2019-19056/", }, { category: "self", summary: "SUSE CVE CVE-2019-19057 page", url: "https://www.suse.com/security/cve/CVE-2019-19057/", }, { category: "self", summary: "SUSE CVE CVE-2019-19058 page", url: "https://www.suse.com/security/cve/CVE-2019-19058/", }, { category: "self", summary: "SUSE CVE CVE-2019-19060 page", url: "https://www.suse.com/security/cve/CVE-2019-19060/", }, { category: "self", summary: "SUSE CVE CVE-2019-19062 page", url: "https://www.suse.com/security/cve/CVE-2019-19062/", }, { category: "self", summary: "SUSE CVE CVE-2019-19063 page", url: "https://www.suse.com/security/cve/CVE-2019-19063/", }, { category: "self", summary: "SUSE CVE CVE-2019-19065 page", url: "https://www.suse.com/security/cve/CVE-2019-19065/", }, { category: "self", summary: "SUSE CVE CVE-2019-19067 page", url: "https://www.suse.com/security/cve/CVE-2019-19067/", }, { category: "self", summary: "SUSE CVE CVE-2019-19068 page", url: "https://www.suse.com/security/cve/CVE-2019-19068/", }, { category: "self", summary: "SUSE CVE CVE-2019-19073 page", url: "https://www.suse.com/security/cve/CVE-2019-19073/", }, { category: "self", summary: "SUSE CVE CVE-2019-19074 page", url: "https://www.suse.com/security/cve/CVE-2019-19074/", }, { category: "self", summary: "SUSE CVE CVE-2019-19075 page", url: "https://www.suse.com/security/cve/CVE-2019-19075/", }, { category: "self", summary: "SUSE CVE CVE-2019-19077 page", url: "https://www.suse.com/security/cve/CVE-2019-19077/", }, { category: "self", summary: "SUSE CVE CVE-2019-19078 page", url: "https://www.suse.com/security/cve/CVE-2019-19078/", }, { category: "self", summary: "SUSE CVE CVE-2019-19080 page", url: "https://www.suse.com/security/cve/CVE-2019-19080/", }, { category: "self", summary: "SUSE CVE CVE-2019-19081 page", url: "https://www.suse.com/security/cve/CVE-2019-19081/", }, { category: "self", summary: "SUSE CVE CVE-2019-19082 page", url: "https://www.suse.com/security/cve/CVE-2019-19082/", }, { category: "self", summary: "SUSE CVE CVE-2019-19083 page", url: "https://www.suse.com/security/cve/CVE-2019-19083/", }, { category: "self", summary: "SUSE CVE CVE-2019-19227 page", url: "https://www.suse.com/security/cve/CVE-2019-19227/", }, { category: "self", summary: "SUSE CVE CVE-2019-19524 page", url: "https://www.suse.com/security/cve/CVE-2019-19524/", }, { category: "self", summary: "SUSE CVE CVE-2019-19525 page", url: "https://www.suse.com/security/cve/CVE-2019-19525/", }, { category: "self", summary: "SUSE CVE CVE-2019-19528 page", url: "https://www.suse.com/security/cve/CVE-2019-19528/", }, { category: "self", summary: "SUSE CVE CVE-2019-19529 page", url: "https://www.suse.com/security/cve/CVE-2019-19529/", }, { category: "self", summary: "SUSE CVE CVE-2019-19530 page", url: "https://www.suse.com/security/cve/CVE-2019-19530/", }, { category: "self", summary: "SUSE CVE CVE-2019-19531 page", url: "https://www.suse.com/security/cve/CVE-2019-19531/", }, { category: "self", summary: "SUSE CVE CVE-2019-19534 page", url: "https://www.suse.com/security/cve/CVE-2019-19534/", }, { category: "self", summary: "SUSE CVE CVE-2019-19536 page", url: "https://www.suse.com/security/cve/CVE-2019-19536/", }, { category: "self", summary: "SUSE CVE CVE-2019-19543 page", url: "https://www.suse.com/security/cve/CVE-2019-19543/", }, { category: "self", summary: "SUSE Bug SLE-4805", url: "https://bugzilla.suse.com/SLE-4805", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-12-20T06:24:29Z", generator: { date: "2019-12-20T06:24:29Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:3372-1", initial_release_date: "2019-12-20T06:24:29Z", revision_history: [ { date: "2019-12-20T06:24:29Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-4.12.14-8.22.1.noarch", product: { name: "kernel-devel-azure-4.12.14-8.22.1.noarch", product_id: "kernel-devel-azure-4.12.14-8.22.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.12.14-8.22.1.noarch", product: { name: "kernel-source-azure-4.12.14-8.22.1.noarch", product_id: "kernel-source-azure-4.12.14-8.22.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-4.12.14-8.22.1.x86_64", product: { name: "cluster-md-kmp-azure-4.12.14-8.22.1.x86_64", product_id: "cluster-md-kmp-azure-4.12.14-8.22.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-4.12.14-8.22.1.x86_64", product: { name: "dlm-kmp-azure-4.12.14-8.22.1.x86_64", product_id: "dlm-kmp-azure-4.12.14-8.22.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-4.12.14-8.22.1.x86_64", product: { name: "gfs2-kmp-azure-4.12.14-8.22.1.x86_64", product_id: "gfs2-kmp-azure-4.12.14-8.22.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-4.12.14-8.22.1.x86_64", product: { name: "kernel-azure-4.12.14-8.22.1.x86_64", product_id: "kernel-azure-4.12.14-8.22.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.12.14-8.22.1.x86_64", product: { name: "kernel-azure-base-4.12.14-8.22.1.x86_64", product_id: "kernel-azure-base-4.12.14-8.22.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.12.14-8.22.1.x86_64", product: { name: "kernel-azure-devel-4.12.14-8.22.1.x86_64", product_id: "kernel-azure-devel-4.12.14-8.22.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-4.12.14-8.22.1.x86_64", product: { name: "kernel-azure-extra-4.12.14-8.22.1.x86_64", product_id: "kernel-azure-extra-4.12.14-8.22.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-4.12.14-8.22.1.x86_64", product: { name: "kernel-azure-livepatch-devel-4.12.14-8.22.1.x86_64", product_id: "kernel-azure-livepatch-devel-4.12.14-8.22.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.12.14-8.22.1.x86_64", product: { name: "kernel-syms-azure-4.12.14-8.22.1.x86_64", product_id: "kernel-syms-azure-4.12.14-8.22.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-4.12.14-8.22.1.x86_64", product: { name: "kselftests-kmp-azure-4.12.14-8.22.1.x86_64", product_id: "kselftests-kmp-azure-4.12.14-8.22.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-4.12.14-8.22.1.x86_64", product: { name: "ocfs2-kmp-azure-4.12.14-8.22.1.x86_64", product_id: "ocfs2-kmp-azure-4.12.14-8.22.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-4.12.14-8.22.1.x86_64", product: { name: "reiserfs-kmp-azure-4.12.14-8.22.1.x86_64", product_id: "reiserfs-kmp-azure-4.12.14-8.22.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-8.22.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", }, product_reference: "kernel-azure-4.12.14-8.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-8.22.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-8.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-8.22.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-8.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-8.22.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-8.22.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-8.22.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-8.22.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-8.22.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-8.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0154", }, ], notes: [ { category: "general", text: "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0154", url: "https://www.suse.com/security/cve/CVE-2019-0154", }, { category: "external", summary: "SUSE Bug 1135966 for CVE-2019-0154", url: "https://bugzilla.suse.com/1135966", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2019-0154", url: "https://bugzilla.suse.com/1181720", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "important", }, ], title: "CVE-2019-0154", }, { cve: "CVE-2019-14895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14895", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14895", url: "https://www.suse.com/security/cve/CVE-2019-14895", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1157158 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157158", }, { category: "external", summary: "SUSE Bug 1173100 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173100", }, { category: "external", summary: "SUSE Bug 1173660 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "important", }, ], title: "CVE-2019-14895", }, { cve: "CVE-2019-14901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14901", }, ], notes: [ { category: "general", text: "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14901", url: "https://www.suse.com/security/cve/CVE-2019-14901", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14901", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1173661 for CVE-2019-14901", url: "https://bugzilla.suse.com/1173661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "important", }, ], title: "CVE-2019-14901", }, { cve: "CVE-2019-15213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15213", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15213", url: "https://www.suse.com/security/cve/CVE-2019-15213", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146544 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146544", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-15213", }, { cve: "CVE-2019-15916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15916", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15916", url: "https://www.suse.com/security/cve/CVE-2019-15916", }, { category: "external", summary: "SUSE Bug 1149448 for CVE-2019-15916", url: "https://bugzilla.suse.com/1149448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "low", }, ], title: "CVE-2019-15916", }, { cve: "CVE-2019-16231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16231", }, ], notes: [ { category: "general", text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16231", url: "https://www.suse.com/security/cve/CVE-2019-16231", }, { category: "external", summary: "SUSE Bug 1150466 for CVE-2019-16231", url: "https://bugzilla.suse.com/1150466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "low", }, ], title: "CVE-2019-16231", }, { cve: "CVE-2019-17055", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17055", }, ], notes: [ { category: "general", text: "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17055", url: "https://www.suse.com/security/cve/CVE-2019-17055", }, { category: "external", summary: "SUSE Bug 1152782 for CVE-2019-17055", url: "https://bugzilla.suse.com/1152782", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "low", }, ], title: "CVE-2019-17055", }, { cve: "CVE-2019-18660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18660", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18660", url: "https://www.suse.com/security/cve/CVE-2019-18660", }, { category: "external", summary: "SUSE Bug 1157038 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157038", }, { category: "external", summary: "SUSE Bug 1157923 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-18660", }, { cve: "CVE-2019-18683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18683", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18683", url: "https://www.suse.com/security/cve/CVE-2019-18683", }, { category: "external", summary: "SUSE Bug 1155897 for CVE-2019-18683", url: "https://bugzilla.suse.com/1155897", }, { category: "external", summary: "SUSE Bug 1173868 for CVE-2019-18683", url: "https://bugzilla.suse.com/1173868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-18683", }, { cve: "CVE-2019-18805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18805", }, ], notes: [ { category: "general", text: "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18805", url: "https://www.suse.com/security/cve/CVE-2019-18805", }, { category: "external", summary: "SUSE Bug 1156187 for CVE-2019-18805", url: "https://bugzilla.suse.com/1156187", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "low", }, ], title: "CVE-2019-18805", }, { cve: "CVE-2019-18809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18809", }, ], notes: [ { category: "general", text: "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18809", url: "https://www.suse.com/security/cve/CVE-2019-18809", }, { category: "external", summary: "SUSE Bug 1156258 for CVE-2019-18809", url: "https://bugzilla.suse.com/1156258", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-18809", }, { cve: "CVE-2019-19046", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19046", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19046", url: "https://www.suse.com/security/cve/CVE-2019-19046", }, { category: "external", summary: "SUSE Bug 1157304 for CVE-2019-19046", url: "https://bugzilla.suse.com/1157304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19046", }, { cve: "CVE-2019-19049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19049", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19049", url: "https://www.suse.com/security/cve/CVE-2019-19049", }, { category: "external", summary: "SUSE Bug 1157173 for CVE-2019-19049", url: "https://bugzilla.suse.com/1157173", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19049", }, { cve: "CVE-2019-19052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19052", }, ], notes: [ { category: "general", text: "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19052", url: "https://www.suse.com/security/cve/CVE-2019-19052", }, { category: "external", summary: "SUSE Bug 1157324 for CVE-2019-19052", url: "https://bugzilla.suse.com/1157324", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19052", }, { cve: "CVE-2019-19056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19056", }, ], notes: [ { category: "general", text: "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19056", url: "https://www.suse.com/security/cve/CVE-2019-19056", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19056", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19057", }, ], notes: [ { category: "general", text: "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19057", url: "https://www.suse.com/security/cve/CVE-2019-19057", }, { category: "external", summary: "SUSE Bug 1157193 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157193", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "low", }, ], title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19058", }, ], notes: [ { category: "general", text: "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19058", url: "https://www.suse.com/security/cve/CVE-2019-19058", }, { category: "external", summary: "SUSE Bug 1157145 for CVE-2019-19058", url: "https://bugzilla.suse.com/1157145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19058", }, { cve: "CVE-2019-19060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19060", }, ], notes: [ { category: "general", text: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19060", url: "https://www.suse.com/security/cve/CVE-2019-19060", }, { category: "external", summary: "SUSE Bug 1157178 for CVE-2019-19060", url: "https://bugzilla.suse.com/1157178", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19060", }, { cve: "CVE-2019-19062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19062", }, ], notes: [ { category: "general", text: "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19062", url: "https://www.suse.com/security/cve/CVE-2019-19062", }, { category: "external", summary: "SUSE Bug 1157333 for CVE-2019-19062", url: "https://bugzilla.suse.com/1157333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19063", }, ], notes: [ { category: "general", text: "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19063", url: "https://www.suse.com/security/cve/CVE-2019-19063", }, { category: "external", summary: "SUSE Bug 1157298 for CVE-2019-19063", url: "https://bugzilla.suse.com/1157298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19063", }, { cve: "CVE-2019-19065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19065", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19065", url: "https://www.suse.com/security/cve/CVE-2019-19065", }, { category: "external", summary: "SUSE Bug 1157191 for CVE-2019-19065", url: "https://bugzilla.suse.com/1157191", }, { category: "external", summary: "SUSE Bug 1173961 for CVE-2019-19065", url: "https://bugzilla.suse.com/1173961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "important", }, ], title: "CVE-2019-19065", }, { cve: "CVE-2019-19067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19067", }, ], notes: [ { category: "general", text: "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19067", url: "https://www.suse.com/security/cve/CVE-2019-19067", }, { category: "external", summary: "SUSE Bug 1157180 for CVE-2019-19067", url: "https://bugzilla.suse.com/1157180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19068", }, ], notes: [ { category: "general", text: "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19068", url: "https://www.suse.com/security/cve/CVE-2019-19068", }, { category: "external", summary: "SUSE Bug 1157307 for CVE-2019-19068", url: "https://bugzilla.suse.com/1157307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19068", }, { cve: "CVE-2019-19073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19073", }, ], notes: [ { category: "general", text: "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19073", url: "https://www.suse.com/security/cve/CVE-2019-19073", }, { category: "external", summary: "SUSE Bug 1157070 for CVE-2019-19073", url: "https://bugzilla.suse.com/1157070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19074", }, ], notes: [ { category: "general", text: "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19074", url: "https://www.suse.com/security/cve/CVE-2019-19074", }, { category: "external", summary: "SUSE Bug 1157143 for CVE-2019-19074", url: "https://bugzilla.suse.com/1157143", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19075", }, ], notes: [ { category: "general", text: "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19075", url: "https://www.suse.com/security/cve/CVE-2019-19075", }, { category: "external", summary: "SUSE Bug 1157162 for CVE-2019-19075", url: "https://bugzilla.suse.com/1157162", }, { category: "external", summary: "SUSE Bug 1173958 for CVE-2019-19075", url: "https://bugzilla.suse.com/1173958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "low", }, ], title: "CVE-2019-19075", }, { cve: "CVE-2019-19077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19077", }, ], notes: [ { category: "general", text: "A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19077", url: "https://www.suse.com/security/cve/CVE-2019-19077", }, { category: "external", summary: "SUSE Bug 1157171 for CVE-2019-19077", url: "https://bugzilla.suse.com/1157171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19077", }, { cve: "CVE-2019-19078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19078", }, ], notes: [ { category: "general", text: "A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19078", url: "https://www.suse.com/security/cve/CVE-2019-19078", }, { category: "external", summary: "SUSE Bug 1157032 for CVE-2019-19078", url: "https://bugzilla.suse.com/1157032", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19078", }, { cve: "CVE-2019-19080", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19080", }, ], notes: [ { category: "general", text: "Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19080", url: "https://www.suse.com/security/cve/CVE-2019-19080", }, { category: "external", summary: "SUSE Bug 1157044 for CVE-2019-19080", url: "https://bugzilla.suse.com/1157044", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19080", }, { cve: "CVE-2019-19081", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19081", }, ], notes: [ { category: "general", text: "A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19081", url: "https://www.suse.com/security/cve/CVE-2019-19081", }, { category: "external", summary: "SUSE Bug 1157045 for CVE-2019-19081", url: "https://bugzilla.suse.com/1157045", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19081", }, { cve: "CVE-2019-19082", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19082", }, ], notes: [ { category: "general", text: "Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19082", url: "https://www.suse.com/security/cve/CVE-2019-19082", }, { category: "external", summary: "SUSE Bug 1157046 for CVE-2019-19082", url: "https://bugzilla.suse.com/1157046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19082", }, { cve: "CVE-2019-19083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19083", }, ], notes: [ { category: "general", text: "Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19083", url: "https://www.suse.com/security/cve/CVE-2019-19083", }, { category: "external", summary: "SUSE Bug 1157049 for CVE-2019-19083", url: "https://bugzilla.suse.com/1157049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19083", }, { cve: "CVE-2019-19227", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19227", }, ], notes: [ { category: "general", text: "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19227", url: "https://www.suse.com/security/cve/CVE-2019-19227", }, { category: "external", summary: "SUSE Bug 1157678 for CVE-2019-19227", url: "https://bugzilla.suse.com/1157678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19227", }, { cve: "CVE-2019-19524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19524", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19524", url: "https://www.suse.com/security/cve/CVE-2019-19524", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158413 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158413", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "low", }, ], title: "CVE-2019-19524", }, { cve: "CVE-2019-19525", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19525", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19525", url: "https://www.suse.com/security/cve/CVE-2019-19525", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158417 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158417", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19525", }, { cve: "CVE-2019-19528", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19528", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19528", url: "https://www.suse.com/security/cve/CVE-2019-19528", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158407 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158407", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19528", }, { cve: "CVE-2019-19529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19529", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19529", url: "https://www.suse.com/security/cve/CVE-2019-19529", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19529", }, { cve: "CVE-2019-19530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19530", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19530", url: "https://www.suse.com/security/cve/CVE-2019-19530", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158410 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158410", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "moderate", }, ], title: "CVE-2019-19530", }, { cve: "CVE-2019-19531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19531", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19531", url: "https://www.suse.com/security/cve/CVE-2019-19531", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158427", }, { category: "external", summary: "SUSE Bug 1158445 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158445", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "low", }, ], title: "CVE-2019-19531", }, { cve: "CVE-2019-19534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19534", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19534", url: "https://www.suse.com/security/cve/CVE-2019-19534", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158398 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158398", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "low", }, ], title: "CVE-2019-19534", }, { cve: "CVE-2019-19536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19536", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19536", url: "https://www.suse.com/security/cve/CVE-2019-19536", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158394 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158394", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "low", }, ], title: "CVE-2019-19536", }, { cve: "CVE-2019-19543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19543", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19543", url: "https://www.suse.com/security/cve/CVE-2019-19543", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19543", url: "https://bugzilla.suse.com/1158427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.22.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.22.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-20T06:24:29Z", details: "low", }, ], title: "CVE-2019-19543", }, ], }
opensuse-su-2019:2675-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-15211: There was a use-after-free caused by a malicious USB device in drivers/media/v4l2-core/v4l2-dev.c (bnc#1146519).\n- CVE-2019-15213: There was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca (bnc#1158427 1158445).\n- CVE-2019-19543: There is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).\n- CVE-2019-19525: There is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035 (bnc#1158417).\n- CVE-2019-19530: There is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef (bnc#1158410).\n- CVE-2019-19536: There is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0 (bnc#1158394).\n- CVE-2019-19524: There is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9 (bnc#1158413).\n- CVE-2019-19528: There is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d (bnc#1158407).\n- CVE-2019-19534: There is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29 (bnc#1158398).\n- CVE-2019-19529: There is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41 (bnc#1158381).\n- CVE-2019-14901: A heap overflow flaw was found in the Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).\n- CVE-2019-14895: A heap-based buffer overflow was discovered in the Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).\n- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid, which was exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).\n- CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c allowed attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559 (bnc#1156258).\n- CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c was fixed (bnc#1157304).\n- CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2 (bnc#1157032).\n- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042 (bnc#1157333).\n- CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e (bnc#1157193).\n- CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932 (bnc#1157197).\n- CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6 (bnc#1157307).\n- CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allowed attackers to cause a denial of service (memory consumption), aka CID-3f9361695113 (bnc#1157298).\n- CVE-2019-19227: In the AppleTalk subsystem there was a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122 (bnc#1157678).\n- CVE-2019-19081: A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c allowed attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a (bnc#1157045).\n- CVE-2019-19080: Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c allowed attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a (bnc#1157044).\n- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e (bnc#1157191).\n- CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c allowed attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14 (bnc#1157171).\n- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486 (bnc#1157324).\n- CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c were fixed. (bnc#1157180).\n- CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c allowed attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41 (bnc#1157178).\n- CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c was fixed. (bnc#1157173).\n- CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e (bnc#1157162).\n- CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allowed attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5 (bnc#1157145).\n- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4 (bnc#1157143).\n- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10 (bnc#1157070).\n- CVE-2019-19083: Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc allowed attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1 (bnc#1157049).\n- CVE-2019-19082: Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc allowed attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad (bnc#1157046).\n- CVE-2019-15916: There was a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service (bnc#1149448).\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n- ACPI / hotplug / PCI: Allocate resources directly under the non-hotplug bridge (bsc#1111666).\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- acpi/nfit, device-dax: Identify differentiated memory with a unique numa-node (bsc#1158071).\n- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n- ALSA: 6fire: Drop the dead code (git-fixes).\n- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n- ALSA: hda: Fix racy display power access (bsc#1156928).\n- ALSA: hda/hdmi - Clear codec->relaxed_resume flag at unbinding (git-fixes).\n- ALSA: hda: hdmi - fix port numbering for ICL and TGL platforms (git-fixes).\n- ALSA: hda: hdmi - remove redundant code comments (git-fixes).\n- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n- ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC (git-fixes).\n- ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop (git-fixes).\n- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: pcm: Yet another missing check of non-cached buffer type (bsc#1111666).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: usb-audio: Add skip_validation option (git-fixes).\n- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n- ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk() (git-fixes).\n- ALSA: usb-audio: Fix incorrect size check for processing/extension units (git-fixes).\n- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n- ALSA: usb-audio: Fix NULL dereference at parsing BADD (git-fixes).\n- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n- ALSA: usb-audio: sound: usb: usb true/false for bool return type (git-fixes).\n- appledisplay: fix error handling in the scheduled work (git-fixes).\n- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- ata: ep93xx: Use proper enums for directions (bsc#1051510).\n- ath10k: allocate small size dma memory in ath10k_pci_diag_write_mem (bsc#1111666).\n- ath10k: avoid possible memory access violation (bsc#1111666).\n- ath10k: Correct error handling of dma_map_single() (bsc#1111666).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: fix vdev-start timeout on error (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: skip resetting rx filter for WCN3990 (bsc#1111666).\n- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- ath9k_hw: fix uninitialized variable data (bsc#1051510).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n- Bluetooth: delete a stray unlock (bsc#1051510).\n- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands (bsc#1104745).\n- bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands (bsc#1104745 FATE#325918).\n- bnxt_en: Update firmware interface spec. to 1.10.0.47 (bsc#1157115)\n- bnxt_en: Update firmware interface spec. to 1.10.0.89 (bsc#1157115)\n- bnxt_en: Update firmware interface to 1.10.0.69 (bsc#1157115)\n- bpf: fix BTF limits (bsc#1109837).\n- bpf: fix BTF verification of enums (bsc#1109837).\n- bpf: Fix use after free in subprog's jited symbol removal (bsc#1109837).\n- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n- brcmfmac: fix wrong strnchr usage (bsc#1111666).\n- brcmfmac: increase buffer for obtaining firmware capabilities (bsc#1111666).\n- brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).\n- brcmsmac: Use kvmalloc() for ucode allocations (bsc#1111666).\n- btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n- cfg80211: validate wmm rule when setting (bsc#1111666).\n- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).\n- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n- cifs: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n- cifs: fix max ea value size (bsc#1144333, bsc#1154355).\n- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n- cifs: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n- cifs: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n- cifs: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n- cifs: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n- cifs: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n- cifs: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n- cifs: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n- cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).\n- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).\n- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n- cpupower: Fix coredump on VMWare (bsc#1051510).\n- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).\n- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n- crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127354 bsc#1127371).\n- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n- dlm: do not leak kernel pointer to userspace (bsc#1051510).\n- dlm: fix invalid free (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n- docs: move protection-keys.rst to the core-api book (bsc#1078248).\n- docs: move protection-keys.rst to the core-api book (FATE#322447, bsc#1078248).\n- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n- Documentation: x86: convert protection-keys.txt to reST (FATE#322447, bsc#1078248).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1111666).\n- drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported (bsc#1113956)\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm: fix module name in edid_firmware log message (bsc#1113956)\n- drm/i915: Do not dereference request if it may have been retired when (bsc#1142635)\n- drm/i915: Fix and improve MCR selection logic (bsc#1112178)\n- drm/i915/gvt: fix dropping obj reference twice (bsc#1111666).\n- drm/i915: Lock the engine while dumping the active request (bsc#1142635)\n- drm/i915/pmu: 'Frequency' is reported as accumulated cycles (bsc#1112178)\n- drm/i915: Reacquire priolist cache after dropping the engine lock (bsc#1129770)\n- drm/i915: Skip modeset for cdclk changes if possible (bsc#1156928).\n- drm/msm: fix memleak on release (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- Drop scsi-qla2xxx-Fix-memory-leak-when-sending-I-O-fails.patch This patch has introduces an double free. Upstream has dropped it from the scsi-queue before it hit mainline. So let's drop it as well.\n- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n- e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n- ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable (bsc#1158646).\n- ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either (bsc#1158647).\n- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- ext4: fix punch hole for inline_data file systems (bsc#1158640).\n- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n- HID: Fix assumption that devices have inputs (git-fixes).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n- hypfs: Fix error number left in struct pointer member (bsc#1051510).\n- i2c: of: Try to find an I2C adapter matching the parent (bsc#1129770)\n- i40e: enable X710 support (bsc#1151067).\n- IB/mlx5: Free mpi in mp_slave mode (bsc#1103991).\n- IB/mlx5: Free mpi in mp_slave mode (bsc#1103991 FATE#326007).\n- IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command (bsc#1103991).\n- IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command (bsc#1103991 FATE#326007).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ice: fix potential infinite loop because loop counter being too small (bsc#1118661).\n- ice: fix potential infinite loop because loop counter being too small (bsc#1118661 FATE#325277).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- intel_th: Fix a double put_device() in error path (git-fixes).\n- iomap: Fix pipe page leakage during splicing (bsc#1158651).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).\n- irqdomain: Add the missing assignment of domain->fwnode for named fwnode (bsc#1111666).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: check kasprintf() return value (bsc#1051510).\n- iwlwifi: drop packets with bad status in CD (bsc#1111666).\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n- iwlwifi: mvm: use correct FIFO length (bsc#1111666).\n- iwlwifi: pcie: fit reclaim msg to MAX_MSG_LEN (bsc#1111666).\n- iwlwifi: pcie: read correct prph address for newer devices (bsc#1111666).\n- ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 ).\n- ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 FATE#326315 FATE#326317).\n- ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 ).\n- ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 FATE#326315 FATE#326317).\n- kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).\n- kABI fixup alloc_dax_region (bsc#1158071).\n- kabi: s390: struct subchannel (git-fixes).\n- kABI workaround for ath10k hw_filter_reset_required field (bsc#1111666).\n- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n- kABI workaround for iwlwifi iwl_rx_cmd_buffer change (bsc#1111666).\n- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n- KVM: s390: fix __insn32_query() inline assembly (git-fixes).\n- KVM: s390: vsie: Do not shadow CRYCB when no AP and no keys (git-fixes).\n- KVM: s390: vsie: Return correct values for Invalid CRYCB format (git-fixes).\n- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n- libnvdimm: Export the target_node attribute for regions and namespaces (bsc#1158071).\n- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995 fate#323487).\n- livepatch: Basic API to track system state changes (bsc#1071995 ).\n- livepatch: Basic API to track system state changes (bsc#1071995 fate#323487).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995 fate#323487).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995 fate#323487).\n- loop: add ioctl for changing logical block size (bsc#1108043).\n- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n- lpfc: size cpu map by last cpu id set (bsc#1157160).\n- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n- macvlan: schedule bc_work even if error (bsc#1051510).\n- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: bdisp: fix memleak on release (git-fixes).\n- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n- media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n- media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).\n- media: radio: wl1273: fix interrupt masking on release (git-fixes).\n- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n- media: vim2m: Fix abort issue (git-fixes).\n- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n- mei: fix modalias documentation (git-fixes).\n- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095) Fix badly backported patch\n- mlxsw: spectrum_flower: Fail in case user specifies multiple mirror actions (bsc#1112374).\n- mmc: core: fix wl1251 sdio quirks (git-fixes).\n- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).\n- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdio: fix wl1251 vendor id (git-fixes).\n- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n- mt76x0: init hw capabilities.\n- mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n- mwifex: free rx_cmd skb in suspended state (bsc#1111666).\n- mwifiex: do no submit URB in suspended state (bsc#1111666).\n- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n- nbd: prevent memory leak (bsc#1158638).\n- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).\n- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n- net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).\n- net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).\n- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n- net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).\n- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n- net: dsa: fix switch tree list (networking-stable-19_11_05).\n- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n- net: hns3: change GFP flag during lock period (bsc#1104353 ).\n- net: hns3: change GFP flag during lock period (bsc#1104353 FATE#326415).\n- net: hns3: do not query unsupported commands in debugfs (bsc#1104353).\n- net: hns3: do not query unsupported commands in debugfs (bsc#1104353 FATE#326415).\n- net: hns3: fix GFP flag error in hclge_mac_update_stats() (bsc#1126390).\n- net: hns3: fix some reset handshake issue (bsc#1104353 ).\n- net: hns3: fix some reset handshake issue (bsc#1104353 FATE#326415).\n- net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353 bsc#1134983).\n- net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353 FATE#326415 bsc#1134983).\n- net: hns: Fix the stray netpoll locks causing deadlock in NAPI path (bsc#1104353).\n- net: hns: Fix the stray netpoll locks causing deadlock in NAPI path (bsc#1104353 FATE#326415).\n- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n- net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 ).\n- net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 FATE#326006).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 ).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 FATE#326006).\n- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n- net/mlx5e: Print a warning when LRO feature is dropped or not allowed (bsc#1103990).\n- net/mlx5e: Print a warning when LRO feature is dropped or not allowed (bsc#1103990 FATE#326006).\n- net/mlx5: FWTrace, Reduce stack usage (bsc#1103990).\n- net/mlx5: FWTrace, Reduce stack usage (bsc#1103990 FATE#326006).\n- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n- net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 ).\n- net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 FATE#326472).\n- net: phylink: Fix flow control resolution (bsc#1119113 ).\n- net: phylink: Fix flow control resolution (bsc#1119113 FATE#326472).\n- net: sched: cbs: Avoid division by zero when calculating the port rate (bsc#1109837).\n- net/sched: cbs: Fix not adding cbs instance to list (bsc#1109837).\n- net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate (bsc#1109837).\n- net: sched: fix possible crash in tcf_action_destroy() (bsc#1109837).\n- net: sched: fix reordering issues (bsc#1109837).\n- net/smc: avoid fallback in case of non-blocking connect (git-fixes).\n- net/smc: do not schedule tx_work in SMC_CLOSED state (git-fixes).\n- net/smc: fix closing of fallback SMC sockets (git-fixes).\n- net/smc: Fix error path in smc_init (git-fixes).\n- net/smc: fix ethernet interface refcounting (git-fixes).\n- net/smc: fix fastopen for non-blocking connect() (git-fixes).\n- net/smc: fix refcounting for non-blocking connect() (git-fixes).\n- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).\n- net/smc: fix SMCD link group creation with VLAN id (git-fixes).\n- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).\n- net/smc: original socket family in inet_sock_diag (git-fixes).\n- net: sock_map, fix missing ulp check in sock hash case (bsc#1109837).\n- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n- nfc: netlink: fix double device reference drop (git-fixes).\n- NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- nfc: port100: handle command failure cleanly (git-fixes).\n- nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs (bsc#1109837).\n- nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs (bsc#1109837).\n- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n- nvme-tcp: support C2HData with SUCCESS flag (bsc#1157386).\n- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n- ocfs2: fix passing zero to 'PTR_ERR' warning (bsc#1158649).\n- openvswitch: fix flow command message size (git-fixes).\n- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n- PCI: pciehp: Do not disable interrupt twice on suspend (bsc#1111666).\n- PCI/PM: Clear PCIe PME Status even for legacy power management (bsc#1111666).\n- PCI/PME: Fix possible use-after-free on remove (git-fixes).\n- PCI/PTM: Remove spurious 'd' from granularity message (bsc#1051510).\n- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n- PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30 (git-fixes).\n- perf/x86/amd: Change/fix NMI latency mitigation to use a timestamp (bsc#1142924).\n- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).\n- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n- PM / devfreq: passive: fix compiler warning (bsc#1051510).\n- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n- powerpc/bpf: Fix tail call implementation (bsc#1157698).\n- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n- printk: Export console_printk (bsc#1071995).\n- printk: Export console_printk (bsc#1071995 fate#323487).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n- qxl: fix null-pointer crash during suspend (bsc#1111666).\n- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n- RDMA/bnxt_re: Fix stat push into dma buffer on gen p5 devices (bsc#1157115)\n- RDMA/efa: Clear the admin command buffer prior to its submission (git-fixes) Patch was already picked through Amazon driver repo but was not marked with a Git-commit tag\n- RDMA/hns: Fix comparison of unsigned long variable 'end' with less than zero (bsc#1104427 bsc#1137236).\n- RDMA/hns: Fix comparison of unsigned long variable 'end' with less than zero (bsc#1104427 FATE#326416 bsc#1137236).\n- RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 ).\n- RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 FATE#326416).\n- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n- Remove patches that reportedly cause regression (bsc#1155689 ltc#182047).\n- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).\n- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n- Revert 'drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)' This reverts commit 71e3a1b8d8cf73f711f3e4100aa51f68e631f94f. ATM the backported patch does not build on x86.\n- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n- rt2800: remove errornous duplicate condition (git-fixes).\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtlwifi: btcoex: Use proper enumerated types for Wi-Fi only interface (bsc#1111666).\n- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n- s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n- s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n- s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n- s390/cio: fix virtio-ccw DMA without PV (git-fixes).\n- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n- s390: fix stfle zero padding (bsc#1051510).\n- s390/idle: fix cpu idle time calculation (bsc#1051510).\n- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n- s390/process: avoid potential reading of freed stack (bsc#1051510).\n- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n- s390/qeth: return proper errno on IO error (bsc#1051510).\n- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n- s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n- s390: vsie: Use effective CRYCBD.31 to check CRYCBD validity (git-fixes).\n- s390/zcrypt: fix memleak at release (git-fixes).\n- scsi: lpfc: Add enablement of multiple adapter dumps (bsc#1154601).\n- scsi: lpfc: Add registration for CPU Offline/Online events (bsc#1154601).\n- scsi: lpfc: Change default IRQ model on AMD architectures (bsc#1154601).\n- scsi: lpfc: Clarify FAWNN error message (bsc#1154601).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_get_sgl_per_hdwq() (bsc#1154601).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_sli4_enable_intr() (bsc#1154601).\n- scsi: lpfc: fix build error of lpfc_debugfs.c for vfree/vmalloc (bsc#1154601).\n- scsi: lpfc: Fix configuration of BB credit recovery in service parameters (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_get_scsi_buf_s3(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow (bsc#1154601).\n- scsi: lpfc: Fix dynamic fw log enablement check (bsc#1154601).\n- scsi: lpfc: fix inlining of lpfc_sli4_cleanup_poll_list() (bsc#1154601).\n- scsi: lpfc: Fix kernel crash at lpfc_nvme_info_show during remote port bounce (bsc#1154601).\n- scsi: lpfc: Fix lpfc_cpumask_of_node_init() (bsc#1154601).\n- scsi: lpfc: Fix NULL check before mempool_destroy is not needed (bsc#1154601).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: lpfc: fix spelling error in MAGIC_NUMER_xxx (bsc#1154601).\n- scsi: lpfc: Fix unexpected error messages during RSCN handling (bsc#1154601).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1154601).\n- scsi: lpfc: Initialize cpu_map for not present cpus (bsc#1154601).\n- scsi: lpfc: lpfc_attr: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: lpfc_nvmet: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: Make lpfc_debugfs_ras_log_data static (bsc#1154601).\n- scsi: lpfc: Mitigate high memory pre-allocation by SCSI-MQ (bsc#1154601).\n- scsi: lpfc: Raise config max for lpfc_fcp_mq_threshold variable (bsc#1154601).\n- scsi: lpfc: revise nvme max queues to be hdwq count (bsc#1154601).\n- scsi: lpfc: Sync with FC-NVMe-2 SLER change to require Conf with SLER (bsc#1154601).\n- scsi: lpfc: Update lpfc version to 12.6.0.1 (bsc#1154601).\n- scsi: lpfc: Update lpfc version to 12.6.0.2 (bsc#1154601).\n- scsi: lpfc: use hdwq assigned cpu for allocation (bsc#1157160).\n- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n- scsi: qla2xxx: Use correct number of vectors for online CPUs (bsc#1137223).\n- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n- sctp: fix SCTP regression (bsc#1158082) (networking-stable-19_10_24 bsc#1158082).\n- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: Fix use-after-free Read in slip_open (bsc#1051510).\n- smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).\n- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- Sort series.conf.\n- spi: atmel: Fix CS high support (bsc#1051510).\n- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n- spi: spidev: Fix OF tree warning logic (bsc#1051510).\n- supported.conf:\n- synclink_gt(): fix compat_ioctl() (bsc#1051510).\n- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: check msg->req data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n- tipc: compat: allow tipc commands without arguments (bsc#1051510).\n- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n- tipc: handle the err returned from cmd header function (bsc#1051510).\n- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n- tipc: tipc clang warning (bsc#1051510).\n- tools: bpftool: fix arguments for p_err() in do_event_pipe() (bsc#1109837).\n- tools/power/x86/intel-speed-select: Fix a read overflow in isst_set_tdp_level_msr() (bsc#1111666).\n- tpm: add check after commands attribs tab allocation (bsc#1051510).\n- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: msm_serial: Fix flow control (bsc#1051510).\n- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n- tun: fix data-race in gro_normal_list() (bsc#1111666).\n- UAS: Revert commit 3ae62a42090f ('UAS: fix alignment of scatter/gather segments').\n- ubifs: Correctly initialize c->min_log_bytes (bsc#1158641).\n- ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n- Update patches.suse/ipv6-defrag-drop-non-last-frags-smaller-than-min-mtu.patch (add bsc#1141054).\n- Update patches.suse/RDMA-Fix-goto-target-to-release-the-allocated-memory.patch (bsc#1050244 FATE#322915 bsc#1157171 CVE-2019-19077).\n- USB: chaoskey: fix error case of a timeout (git-fixes).\n- usb: chipidea: Fix otg event handler (bsc#1051510).\n- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- USBIP: add config dependency for SGL_ALLOC (git-fixes).\n- usbip: Fix free of unallocated memory in vhci tx (git-fixes).\n- usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n- usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n- USB: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n- USB: serial: mos7720: fix remote wakeup (git-fixes).\n- USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n- USB: serial: mos7840: fix remote wakeup (git-fixes).\n- USB: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n- USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n- video/hdmi: Fix AVI bar unpack (git-fixes).\n- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n- virtio_ring: fix return code on DMA mapping fails (git-fixes).\n- virtio/s390: fix race on airq_areas (bsc#1051510).\n- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n- watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n- wil6210: drop Rx multicast packets that are looped-back to STA (bsc#1111666).\n- wil6210: fix debugfs memory access alignment (bsc#1111666).\n- wil6210: fix invalid memory access for rx_buff_mgmt debugfs (bsc#1111666).\n- wil6210: fix L2 RX status handling (bsc#1111666).\n- wil6210: fix locking in wmi_call (bsc#1111666).\n- wil6210: fix RGF_CAF_ICR address for Talyn-MB (bsc#1111666).\n- wil6210: prevent usage of tx ring 0 for eDMA (bsc#1111666).\n- wil6210: set edma variables only for Talyn-MB devices (bsc#1111666).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (FATE#322447, bsc#1078248).\n- x86/pkeys: Update documentation about availability (bsc#1078248).\n- x86/pkeys: Update documentation about availability (FATE#322447, bsc#1078248).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xfrm: Fix xfrm sel prefix length validation (git-fixes).\n- xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n- xsk: Fix registration of Rx-only sockets (bsc#1109837).\n- xsk: relax UMEM headroom alignment (bsc#1109837).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-2675", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2675-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:2675-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:2675-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W", }, { category: "self", summary: "SUSE Bug 1051510", url: "https://bugzilla.suse.com/1051510", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1078248", url: "https://bugzilla.suse.com/1078248", }, { category: "self", summary: "SUSE Bug 1089644", url: "https://bugzilla.suse.com/1089644", }, { category: "self", summary: "SUSE Bug 1091041", url: "https://bugzilla.suse.com/1091041", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103991", url: "https://bugzilla.suse.com/1103991", }, { category: "self", summary: "SUSE Bug 1104353", url: "https://bugzilla.suse.com/1104353", }, { category: "self", summary: "SUSE Bug 1104427", url: "https://bugzilla.suse.com/1104427", }, { category: "self", summary: "SUSE Bug 1104745", url: "https://bugzilla.suse.com/1104745", }, { category: "self", summary: "SUSE Bug 1108043", url: "https://bugzilla.suse.com/1108043", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1111666", url: "https://bugzilla.suse.com/1111666", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1113722", url: "https://bugzilla.suse.com/1113722", }, { category: "self", summary: "SUSE Bug 1113956", url: "https://bugzilla.suse.com/1113956", }, { category: "self", summary: "SUSE Bug 1113994", url: "https://bugzilla.suse.com/1113994", }, { category: "self", summary: "SUSE Bug 1114279", url: "https://bugzilla.suse.com/1114279", }, { category: "self", summary: "SUSE Bug 1117169", url: "https://bugzilla.suse.com/1117169", }, { category: "self", summary: "SUSE Bug 1118661", url: "https://bugzilla.suse.com/1118661", }, { category: "self", summary: "SUSE Bug 1119113", url: "https://bugzilla.suse.com/1119113", }, { category: "self", summary: "SUSE Bug 1120853", url: "https://bugzilla.suse.com/1120853", }, { category: "self", summary: "SUSE Bug 1126390", url: "https://bugzilla.suse.com/1126390", }, { category: "self", summary: "SUSE Bug 1127354", url: "https://bugzilla.suse.com/1127354", }, { category: "self", summary: "SUSE Bug 1127371", url: "https://bugzilla.suse.com/1127371", }, { category: "self", summary: "SUSE Bug 1129770", url: "https://bugzilla.suse.com/1129770", }, { category: "self", summary: "SUSE Bug 1131107", url: "https://bugzilla.suse.com/1131107", }, { category: "self", summary: "SUSE Bug 1134983", url: "https://bugzilla.suse.com/1134983", }, { category: "self", summary: "SUSE Bug 1137223", url: "https://bugzilla.suse.com/1137223", }, { category: "self", summary: "SUSE Bug 1137236", url: "https://bugzilla.suse.com/1137236", }, { category: "self", summary: "SUSE Bug 1138039", url: "https://bugzilla.suse.com/1138039", }, { category: "self", summary: "SUSE Bug 1140948", url: "https://bugzilla.suse.com/1140948", }, { category: "self", summary: "SUSE Bug 1141054", url: "https://bugzilla.suse.com/1141054", }, { category: "self", summary: "SUSE Bug 1142095", url: "https://bugzilla.suse.com/1142095", }, { category: "self", summary: "SUSE Bug 1142635", url: "https://bugzilla.suse.com/1142635", }, { category: "self", summary: "SUSE Bug 1142924", url: "https://bugzilla.suse.com/1142924", }, { category: "self", summary: "SUSE Bug 1144333", url: "https://bugzilla.suse.com/1144333", }, { category: "self", summary: "SUSE Bug 1146519", url: "https://bugzilla.suse.com/1146519", }, { category: "self", summary: "SUSE Bug 1146544", url: "https://bugzilla.suse.com/1146544", }, { category: "self", summary: "SUSE Bug 1149448", url: "https://bugzilla.suse.com/1149448", }, { category: "self", summary: "SUSE Bug 1151067", url: "https://bugzilla.suse.com/1151067", }, { category: "self", summary: "SUSE Bug 1151548", url: "https://bugzilla.suse.com/1151548", }, { category: "self", summary: "SUSE Bug 1151900", url: "https://bugzilla.suse.com/1151900", }, { category: "self", summary: "SUSE Bug 1153628", url: "https://bugzilla.suse.com/1153628", }, { category: "self", summary: "SUSE Bug 1153811", url: "https://bugzilla.suse.com/1153811", }, { category: "self", summary: "SUSE Bug 1154043", url: "https://bugzilla.suse.com/1154043", }, { category: "self", summary: "SUSE Bug 1154058", url: "https://bugzilla.suse.com/1154058", }, { category: "self", summary: "SUSE Bug 1154355", url: "https://bugzilla.suse.com/1154355", }, { category: "self", summary: "SUSE Bug 1154601", url: "https://bugzilla.suse.com/1154601", }, { category: "self", summary: "SUSE Bug 1155689", url: "https://bugzilla.suse.com/1155689", }, { category: "self", summary: "SUSE Bug 1155897", url: "https://bugzilla.suse.com/1155897", }, { category: "self", summary: "SUSE Bug 1155921", url: "https://bugzilla.suse.com/1155921", }, { category: "self", summary: "SUSE Bug 1156258", url: "https://bugzilla.suse.com/1156258", }, { category: "self", summary: "SUSE Bug 1156466", url: "https://bugzilla.suse.com/1156466", }, { category: "self", summary: "SUSE Bug 1156471", url: "https://bugzilla.suse.com/1156471", }, { category: "self", summary: "SUSE Bug 1156494", url: "https://bugzilla.suse.com/1156494", }, { category: "self", summary: "SUSE Bug 1156609", url: "https://bugzilla.suse.com/1156609", }, { category: "self", summary: "SUSE Bug 1156700", url: "https://bugzilla.suse.com/1156700", }, { category: "self", summary: "SUSE Bug 1156729", url: "https://bugzilla.suse.com/1156729", }, { category: "self", summary: "SUSE Bug 1156882", url: "https://bugzilla.suse.com/1156882", }, { category: "self", summary: "SUSE Bug 1156928", url: "https://bugzilla.suse.com/1156928", }, { category: "self", summary: "SUSE Bug 1157032", url: "https://bugzilla.suse.com/1157032", }, { category: "self", summary: "SUSE Bug 1157038", url: "https://bugzilla.suse.com/1157038", }, { category: "self", summary: "SUSE Bug 1157042", url: "https://bugzilla.suse.com/1157042", }, { category: "self", summary: "SUSE Bug 1157044", url: "https://bugzilla.suse.com/1157044", }, { category: "self", summary: "SUSE Bug 1157045", url: "https://bugzilla.suse.com/1157045", }, { category: "self", summary: "SUSE Bug 1157046", url: "https://bugzilla.suse.com/1157046", }, { category: "self", summary: "SUSE Bug 1157049", url: "https://bugzilla.suse.com/1157049", }, { category: "self", summary: "SUSE Bug 1157070", url: "https://bugzilla.suse.com/1157070", }, { category: "self", summary: "SUSE Bug 1157115", url: "https://bugzilla.suse.com/1157115", }, { category: "self", summary: "SUSE Bug 1157143", url: "https://bugzilla.suse.com/1157143", }, { category: "self", summary: "SUSE Bug 1157145", url: "https://bugzilla.suse.com/1157145", }, { category: "self", summary: "SUSE Bug 1157158", url: "https://bugzilla.suse.com/1157158", }, { category: "self", summary: "SUSE Bug 1157160", url: "https://bugzilla.suse.com/1157160", }, { category: "self", summary: "SUSE Bug 1157162", url: "https://bugzilla.suse.com/1157162", }, { category: "self", summary: "SUSE Bug 1157171", url: "https://bugzilla.suse.com/1157171", }, { category: "self", summary: "SUSE Bug 1157173", url: "https://bugzilla.suse.com/1157173", }, { category: "self", summary: "SUSE Bug 1157178", url: "https://bugzilla.suse.com/1157178", }, { category: "self", summary: "SUSE Bug 1157180", url: "https://bugzilla.suse.com/1157180", }, { category: "self", summary: "SUSE Bug 1157182", url: "https://bugzilla.suse.com/1157182", }, { category: "self", summary: "SUSE Bug 1157183", url: "https://bugzilla.suse.com/1157183", }, { category: "self", summary: "SUSE Bug 1157184", url: "https://bugzilla.suse.com/1157184", }, { category: "self", summary: "SUSE Bug 1157191", url: "https://bugzilla.suse.com/1157191", }, { category: "self", summary: "SUSE Bug 1157193", url: "https://bugzilla.suse.com/1157193", }, { category: "self", summary: "SUSE Bug 1157197", url: "https://bugzilla.suse.com/1157197", }, { category: "self", summary: "SUSE Bug 1157298", url: "https://bugzilla.suse.com/1157298", }, { category: "self", summary: "SUSE Bug 1157304", url: "https://bugzilla.suse.com/1157304", }, { category: "self", summary: "SUSE Bug 1157307", url: "https://bugzilla.suse.com/1157307", }, { category: "self", summary: "SUSE Bug 1157324", url: "https://bugzilla.suse.com/1157324", }, { category: "self", summary: "SUSE Bug 1157333", url: "https://bugzilla.suse.com/1157333", }, { category: "self", summary: "SUSE Bug 1157386", url: "https://bugzilla.suse.com/1157386", }, { category: "self", summary: "SUSE Bug 1157424", url: "https://bugzilla.suse.com/1157424", }, { category: "self", summary: "SUSE Bug 1157463", url: "https://bugzilla.suse.com/1157463", }, { category: "self", summary: "SUSE Bug 1157499", url: "https://bugzilla.suse.com/1157499", }, { category: "self", summary: "SUSE Bug 1157678", url: "https://bugzilla.suse.com/1157678", }, { category: "self", summary: "SUSE Bug 1157698", url: "https://bugzilla.suse.com/1157698", }, { category: "self", summary: "SUSE Bug 1157778", url: "https://bugzilla.suse.com/1157778", }, { category: "self", summary: "SUSE Bug 1157908", url: "https://bugzilla.suse.com/1157908", }, { category: "self", summary: "SUSE Bug 1158049", url: "https://bugzilla.suse.com/1158049", }, { category: "self", summary: "SUSE Bug 1158063", url: "https://bugzilla.suse.com/1158063", }, { category: "self", summary: "SUSE Bug 1158064", url: "https://bugzilla.suse.com/1158064", }, { category: "self", summary: "SUSE Bug 1158065", url: "https://bugzilla.suse.com/1158065", }, { category: "self", summary: "SUSE Bug 1158066", url: "https://bugzilla.suse.com/1158066", }, { category: "self", summary: "SUSE Bug 1158067", url: "https://bugzilla.suse.com/1158067", }, { category: "self", summary: "SUSE Bug 1158068", url: "https://bugzilla.suse.com/1158068", }, { category: "self", summary: "SUSE Bug 1158071", url: "https://bugzilla.suse.com/1158071", }, { category: "self", summary: "SUSE Bug 1158082", url: "https://bugzilla.suse.com/1158082", }, { category: "self", summary: "SUSE Bug 1158381", url: "https://bugzilla.suse.com/1158381", }, { category: "self", summary: "SUSE Bug 1158394", url: "https://bugzilla.suse.com/1158394", }, { category: "self", summary: "SUSE Bug 1158398", url: "https://bugzilla.suse.com/1158398", }, { category: "self", summary: "SUSE Bug 1158407", url: "https://bugzilla.suse.com/1158407", }, { category: "self", summary: "SUSE Bug 1158410", url: "https://bugzilla.suse.com/1158410", }, { category: "self", summary: "SUSE Bug 1158413", url: "https://bugzilla.suse.com/1158413", }, { category: "self", summary: "SUSE Bug 1158417", url: "https://bugzilla.suse.com/1158417", }, { category: "self", summary: "SUSE Bug 1158427", url: "https://bugzilla.suse.com/1158427", }, { category: "self", summary: "SUSE Bug 1158445", url: "https://bugzilla.suse.com/1158445", }, { category: "self", summary: "SUSE Bug 1158637", url: "https://bugzilla.suse.com/1158637", }, { category: "self", summary: "SUSE Bug 1158638", url: "https://bugzilla.suse.com/1158638", }, { category: "self", summary: "SUSE Bug 1158639", url: "https://bugzilla.suse.com/1158639", }, { category: "self", summary: "SUSE Bug 1158640", url: "https://bugzilla.suse.com/1158640", }, { category: "self", summary: "SUSE Bug 1158641", url: "https://bugzilla.suse.com/1158641", }, { category: "self", summary: "SUSE Bug 1158643", url: "https://bugzilla.suse.com/1158643", }, { category: "self", summary: "SUSE Bug 1158644", url: "https://bugzilla.suse.com/1158644", }, { category: "self", summary: "SUSE Bug 1158645", url: "https://bugzilla.suse.com/1158645", }, { category: "self", summary: "SUSE Bug 1158646", url: "https://bugzilla.suse.com/1158646", }, { category: "self", summary: "SUSE Bug 1158647", url: "https://bugzilla.suse.com/1158647", }, { category: "self", summary: "SUSE Bug 1158649", url: "https://bugzilla.suse.com/1158649", }, { category: "self", summary: "SUSE Bug 1158651", url: "https://bugzilla.suse.com/1158651", }, { category: "self", summary: "SUSE Bug 1158652", url: "https://bugzilla.suse.com/1158652", }, { category: "self", summary: "SUSE CVE CVE-2019-14895 page", url: "https://www.suse.com/security/cve/CVE-2019-14895/", }, { category: "self", summary: "SUSE CVE CVE-2019-14901 page", url: "https://www.suse.com/security/cve/CVE-2019-14901/", }, { category: "self", summary: "SUSE CVE CVE-2019-15213 page", url: "https://www.suse.com/security/cve/CVE-2019-15213/", }, { category: "self", summary: "SUSE CVE CVE-2019-15916 page", url: "https://www.suse.com/security/cve/CVE-2019-15916/", }, { category: "self", summary: "SUSE CVE CVE-2019-18660 page", url: "https://www.suse.com/security/cve/CVE-2019-18660/", }, { category: "self", summary: "SUSE CVE CVE-2019-18683 page", url: "https://www.suse.com/security/cve/CVE-2019-18683/", }, { category: "self", summary: "SUSE CVE CVE-2019-18809 page", url: "https://www.suse.com/security/cve/CVE-2019-18809/", }, { category: "self", summary: "SUSE CVE CVE-2019-19046 page", url: "https://www.suse.com/security/cve/CVE-2019-19046/", }, { category: "self", summary: "SUSE CVE CVE-2019-19049 page", url: "https://www.suse.com/security/cve/CVE-2019-19049/", }, { category: "self", summary: "SUSE CVE CVE-2019-19052 page", url: "https://www.suse.com/security/cve/CVE-2019-19052/", }, { category: "self", summary: "SUSE CVE CVE-2019-19056 page", url: "https://www.suse.com/security/cve/CVE-2019-19056/", }, { category: "self", summary: "SUSE CVE CVE-2019-19057 page", url: "https://www.suse.com/security/cve/CVE-2019-19057/", }, { category: "self", summary: "SUSE CVE CVE-2019-19058 page", url: "https://www.suse.com/security/cve/CVE-2019-19058/", }, { category: "self", summary: "SUSE CVE CVE-2019-19060 page", url: "https://www.suse.com/security/cve/CVE-2019-19060/", }, { category: "self", summary: "SUSE CVE CVE-2019-19062 page", url: "https://www.suse.com/security/cve/CVE-2019-19062/", }, { category: "self", summary: "SUSE CVE CVE-2019-19063 page", url: "https://www.suse.com/security/cve/CVE-2019-19063/", }, { category: "self", summary: "SUSE CVE CVE-2019-19065 page", url: "https://www.suse.com/security/cve/CVE-2019-19065/", }, { category: "self", summary: "SUSE CVE CVE-2019-19067 page", url: "https://www.suse.com/security/cve/CVE-2019-19067/", }, { category: "self", summary: "SUSE CVE CVE-2019-19068 page", url: "https://www.suse.com/security/cve/CVE-2019-19068/", }, { category: "self", summary: "SUSE CVE CVE-2019-19073 page", url: "https://www.suse.com/security/cve/CVE-2019-19073/", }, { category: "self", summary: "SUSE CVE CVE-2019-19074 page", url: "https://www.suse.com/security/cve/CVE-2019-19074/", }, { category: "self", summary: "SUSE CVE CVE-2019-19075 page", url: "https://www.suse.com/security/cve/CVE-2019-19075/", }, { category: "self", summary: "SUSE CVE CVE-2019-19077 page", url: "https://www.suse.com/security/cve/CVE-2019-19077/", }, { category: "self", summary: "SUSE CVE CVE-2019-19078 page", url: "https://www.suse.com/security/cve/CVE-2019-19078/", }, { category: "self", summary: "SUSE CVE CVE-2019-19080 page", url: "https://www.suse.com/security/cve/CVE-2019-19080/", }, { category: "self", summary: "SUSE CVE CVE-2019-19081 page", url: "https://www.suse.com/security/cve/CVE-2019-19081/", }, { category: "self", summary: "SUSE CVE CVE-2019-19082 page", url: "https://www.suse.com/security/cve/CVE-2019-19082/", }, { category: "self", summary: "SUSE CVE CVE-2019-19083 page", url: "https://www.suse.com/security/cve/CVE-2019-19083/", }, { category: "self", summary: "SUSE CVE CVE-2019-19227 page", url: "https://www.suse.com/security/cve/CVE-2019-19227/", }, { category: "self", summary: "SUSE CVE CVE-2019-19524 page", url: "https://www.suse.com/security/cve/CVE-2019-19524/", }, { category: "self", summary: "SUSE CVE CVE-2019-19525 page", url: "https://www.suse.com/security/cve/CVE-2019-19525/", }, { category: "self", summary: "SUSE CVE CVE-2019-19528 page", url: "https://www.suse.com/security/cve/CVE-2019-19528/", }, { category: "self", summary: "SUSE CVE CVE-2019-19529 page", url: "https://www.suse.com/security/cve/CVE-2019-19529/", }, { category: "self", summary: "SUSE CVE CVE-2019-19530 page", url: "https://www.suse.com/security/cve/CVE-2019-19530/", }, { category: "self", summary: "SUSE CVE CVE-2019-19531 page", url: "https://www.suse.com/security/cve/CVE-2019-19531/", }, { category: "self", summary: "SUSE CVE CVE-2019-19534 page", url: "https://www.suse.com/security/cve/CVE-2019-19534/", }, { category: "self", summary: "SUSE CVE CVE-2019-19536 page", url: "https://www.suse.com/security/cve/CVE-2019-19536/", }, { category: "self", summary: "SUSE CVE CVE-2019-19543 page", url: "https://www.suse.com/security/cve/CVE-2019-19543/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2019-12-12T09:15:03Z", generator: { date: "2019-12-12T09:15:03Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:2675-1", initial_release_date: "2019-12-12T09:15:03Z", revision_history: [ { date: "2019-12-12T09:15:03Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-lp151.28.36.1.noarch", product: { name: "kernel-devel-4.12.14-lp151.28.36.1.noarch", product_id: "kernel-devel-4.12.14-lp151.28.36.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-lp151.28.36.1.noarch", product: { name: "kernel-docs-4.12.14-lp151.28.36.1.noarch", product_id: "kernel-docs-4.12.14-lp151.28.36.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-lp151.28.36.1.noarch", product: { name: "kernel-docs-html-4.12.14-lp151.28.36.1.noarch", product_id: "kernel-docs-html-4.12.14-lp151.28.36.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-lp151.28.36.1.noarch", product: { name: "kernel-macros-4.12.14-lp151.28.36.1.noarch", product_id: "kernel-macros-4.12.14-lp151.28.36.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-lp151.28.36.1.noarch", product: { name: "kernel-source-4.12.14-lp151.28.36.1.noarch", product_id: "kernel-source-4.12.14-lp151.28.36.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", product_id: "kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-debug-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-debug-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-debug-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-default-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-default-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-default-base-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-default-base-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-syms-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-syms-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.1", product: { name: "openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-debug-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-debug-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-base-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-default-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-lp151.28.36.1.noarch as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", }, product_reference: "kernel-devel-4.12.14-lp151.28.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-lp151.28.36.1.noarch as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", }, product_reference: "kernel-docs-4.12.14-lp151.28.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-4.12.14-lp151.28.36.1.noarch as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", }, product_reference: "kernel-docs-html-4.12.14-lp151.28.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-lp151.28.36.1.noarch as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", }, product_reference: "kernel-macros-4.12.14-lp151.28.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-lp151.28.36.1.noarch as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", }, product_reference: "kernel-source-4.12.14-lp151.28.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", }, product_reference: "kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-syms-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", }, product_reference: "kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, ], }, vulnerabilities: [ { cve: "CVE-2019-14895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14895", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14895", url: "https://www.suse.com/security/cve/CVE-2019-14895", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1157158 for CVE-2019-14895", url: "https://bugzilla.suse.com/1157158", }, { category: "external", summary: "SUSE Bug 1173100 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173100", }, { category: "external", summary: "SUSE Bug 1173660 for CVE-2019-14895", url: "https://bugzilla.suse.com/1173660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "important", }, ], title: "CVE-2019-14895", }, { cve: "CVE-2019-14901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14901", }, ], notes: [ { category: "general", text: "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14901", url: "https://www.suse.com/security/cve/CVE-2019-14901", }, { category: "external", summary: "SUSE Bug 1157042 for CVE-2019-14901", url: "https://bugzilla.suse.com/1157042", }, { category: "external", summary: "SUSE Bug 1173661 for CVE-2019-14901", url: "https://bugzilla.suse.com/1173661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "important", }, ], title: "CVE-2019-14901", }, { cve: "CVE-2019-15213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15213", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15213", url: "https://www.suse.com/security/cve/CVE-2019-15213", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146544 for CVE-2019-15213", url: "https://bugzilla.suse.com/1146544", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15213", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-15213", }, { cve: "CVE-2019-15916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15916", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15916", url: "https://www.suse.com/security/cve/CVE-2019-15916", }, { category: "external", summary: "SUSE Bug 1149448 for CVE-2019-15916", url: "https://bugzilla.suse.com/1149448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "low", }, ], title: "CVE-2019-15916", }, { cve: "CVE-2019-18660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18660", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18660", url: "https://www.suse.com/security/cve/CVE-2019-18660", }, { category: "external", summary: "SUSE Bug 1157038 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157038", }, { category: "external", summary: "SUSE Bug 1157923 for CVE-2019-18660", url: "https://bugzilla.suse.com/1157923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-18660", }, { cve: "CVE-2019-18683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18683", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18683", url: "https://www.suse.com/security/cve/CVE-2019-18683", }, { category: "external", summary: "SUSE Bug 1155897 for CVE-2019-18683", url: "https://bugzilla.suse.com/1155897", }, { category: "external", summary: "SUSE Bug 1173868 for CVE-2019-18683", url: "https://bugzilla.suse.com/1173868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-18683", }, { cve: "CVE-2019-18809", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18809", }, ], notes: [ { category: "general", text: "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18809", url: "https://www.suse.com/security/cve/CVE-2019-18809", }, { category: "external", summary: "SUSE Bug 1156258 for CVE-2019-18809", url: "https://bugzilla.suse.com/1156258", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-18809", }, { cve: "CVE-2019-19046", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19046", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19046", url: "https://www.suse.com/security/cve/CVE-2019-19046", }, { category: "external", summary: "SUSE Bug 1157304 for CVE-2019-19046", url: "https://bugzilla.suse.com/1157304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19046", }, { cve: "CVE-2019-19049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19049", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19049", url: "https://www.suse.com/security/cve/CVE-2019-19049", }, { category: "external", summary: "SUSE Bug 1157173 for CVE-2019-19049", url: "https://bugzilla.suse.com/1157173", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19049", }, { cve: "CVE-2019-19052", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19052", }, ], notes: [ { category: "general", text: "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19052", url: "https://www.suse.com/security/cve/CVE-2019-19052", }, { category: "external", summary: "SUSE Bug 1157324 for CVE-2019-19052", url: "https://bugzilla.suse.com/1157324", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19052", }, { cve: "CVE-2019-19056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19056", }, ], notes: [ { category: "general", text: "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19056", url: "https://www.suse.com/security/cve/CVE-2019-19056", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19056", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19057", }, ], notes: [ { category: "general", text: "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19057", url: "https://www.suse.com/security/cve/CVE-2019-19057", }, { category: "external", summary: "SUSE Bug 1157193 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157193", }, { category: "external", summary: "SUSE Bug 1157197 for CVE-2019-19057", url: "https://bugzilla.suse.com/1157197", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "low", }, ], title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19058", }, ], notes: [ { category: "general", text: "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19058", url: "https://www.suse.com/security/cve/CVE-2019-19058", }, { category: "external", summary: "SUSE Bug 1157145 for CVE-2019-19058", url: "https://bugzilla.suse.com/1157145", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19058", }, { cve: "CVE-2019-19060", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19060", }, ], notes: [ { category: "general", text: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19060", url: "https://www.suse.com/security/cve/CVE-2019-19060", }, { category: "external", summary: "SUSE Bug 1157178 for CVE-2019-19060", url: "https://bugzilla.suse.com/1157178", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19060", }, { cve: "CVE-2019-19062", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19062", }, ], notes: [ { category: "general", text: "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19062", url: "https://www.suse.com/security/cve/CVE-2019-19062", }, { category: "external", summary: "SUSE Bug 1157333 for CVE-2019-19062", url: "https://bugzilla.suse.com/1157333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19063", }, ], notes: [ { category: "general", text: "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19063", url: "https://www.suse.com/security/cve/CVE-2019-19063", }, { category: "external", summary: "SUSE Bug 1157298 for CVE-2019-19063", url: "https://bugzilla.suse.com/1157298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19063", }, { cve: "CVE-2019-19065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19065", }, ], notes: [ { category: "general", text: "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19065", url: "https://www.suse.com/security/cve/CVE-2019-19065", }, { category: "external", summary: "SUSE Bug 1157191 for CVE-2019-19065", url: "https://bugzilla.suse.com/1157191", }, { category: "external", summary: "SUSE Bug 1173961 for CVE-2019-19065", url: "https://bugzilla.suse.com/1173961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "important", }, ], title: "CVE-2019-19065", }, { cve: "CVE-2019-19067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19067", }, ], notes: [ { category: "general", text: "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19067", url: "https://www.suse.com/security/cve/CVE-2019-19067", }, { category: "external", summary: "SUSE Bug 1157180 for CVE-2019-19067", url: "https://bugzilla.suse.com/1157180", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19068", }, ], notes: [ { category: "general", text: "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19068", url: "https://www.suse.com/security/cve/CVE-2019-19068", }, { category: "external", summary: "SUSE Bug 1157307 for CVE-2019-19068", url: "https://bugzilla.suse.com/1157307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19068", }, { cve: "CVE-2019-19073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19073", }, ], notes: [ { category: "general", text: "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19073", url: "https://www.suse.com/security/cve/CVE-2019-19073", }, { category: "external", summary: "SUSE Bug 1157070 for CVE-2019-19073", url: "https://bugzilla.suse.com/1157070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19074", }, ], notes: [ { category: "general", text: "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19074", url: "https://www.suse.com/security/cve/CVE-2019-19074", }, { category: "external", summary: "SUSE Bug 1157143 for CVE-2019-19074", url: "https://bugzilla.suse.com/1157143", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19075", }, ], notes: [ { category: "general", text: "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19075", url: "https://www.suse.com/security/cve/CVE-2019-19075", }, { category: "external", summary: "SUSE Bug 1157162 for CVE-2019-19075", url: "https://bugzilla.suse.com/1157162", }, { category: "external", summary: "SUSE Bug 1173958 for CVE-2019-19075", url: "https://bugzilla.suse.com/1173958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "low", }, ], title: "CVE-2019-19075", }, { cve: "CVE-2019-19077", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19077", }, ], notes: [ { category: "general", text: "A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19077", url: "https://www.suse.com/security/cve/CVE-2019-19077", }, { category: "external", summary: "SUSE Bug 1157171 for CVE-2019-19077", url: "https://bugzilla.suse.com/1157171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19077", }, { cve: "CVE-2019-19078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19078", }, ], notes: [ { category: "general", text: "A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19078", url: "https://www.suse.com/security/cve/CVE-2019-19078", }, { category: "external", summary: "SUSE Bug 1157032 for CVE-2019-19078", url: "https://bugzilla.suse.com/1157032", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19078", }, { cve: "CVE-2019-19080", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19080", }, ], notes: [ { category: "general", text: "Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19080", url: "https://www.suse.com/security/cve/CVE-2019-19080", }, { category: "external", summary: "SUSE Bug 1157044 for CVE-2019-19080", url: "https://bugzilla.suse.com/1157044", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19080", }, { cve: "CVE-2019-19081", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19081", }, ], notes: [ { category: "general", text: "A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19081", url: "https://www.suse.com/security/cve/CVE-2019-19081", }, { category: "external", summary: "SUSE Bug 1157045 for CVE-2019-19081", url: "https://bugzilla.suse.com/1157045", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19081", }, { cve: "CVE-2019-19082", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19082", }, ], notes: [ { category: "general", text: "Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19082", url: "https://www.suse.com/security/cve/CVE-2019-19082", }, { category: "external", summary: "SUSE Bug 1157046 for CVE-2019-19082", url: "https://bugzilla.suse.com/1157046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19082", }, { cve: "CVE-2019-19083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19083", }, ], notes: [ { category: "general", text: "Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19083", url: "https://www.suse.com/security/cve/CVE-2019-19083", }, { category: "external", summary: "SUSE Bug 1157049 for CVE-2019-19083", url: "https://bugzilla.suse.com/1157049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19083", }, { cve: "CVE-2019-19227", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19227", }, ], notes: [ { category: "general", text: "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19227", url: "https://www.suse.com/security/cve/CVE-2019-19227", }, { category: "external", summary: "SUSE Bug 1157678 for CVE-2019-19227", url: "https://bugzilla.suse.com/1157678", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19227", }, { cve: "CVE-2019-19524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19524", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19524", url: "https://www.suse.com/security/cve/CVE-2019-19524", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158413 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158413", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19524", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "low", }, ], title: "CVE-2019-19524", }, { cve: "CVE-2019-19525", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19525", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19525", url: "https://www.suse.com/security/cve/CVE-2019-19525", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158417 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158417", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19525", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19525", }, { cve: "CVE-2019-19528", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19528", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19528", url: "https://www.suse.com/security/cve/CVE-2019-19528", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158407 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158407", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19528", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19528", }, { cve: "CVE-2019-19529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19529", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19529", url: "https://www.suse.com/security/cve/CVE-2019-19529", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19529", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19529", }, { cve: "CVE-2019-19530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19530", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19530", url: "https://www.suse.com/security/cve/CVE-2019-19530", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158410 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158410", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19530", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "moderate", }, ], title: "CVE-2019-19530", }, { cve: "CVE-2019-19531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19531", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19531", url: "https://www.suse.com/security/cve/CVE-2019-19531", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158427", }, { category: "external", summary: "SUSE Bug 1158445 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158445", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19531", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "low", }, ], title: "CVE-2019-19531", }, { cve: "CVE-2019-19534", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19534", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19534", url: "https://www.suse.com/security/cve/CVE-2019-19534", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158398 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158398", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19534", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "low", }, ], title: "CVE-2019-19534", }, { cve: "CVE-2019-19536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19536", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19536", url: "https://www.suse.com/security/cve/CVE-2019-19536", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158394 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158394", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-19536", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "low", }, ], title: "CVE-2019-19536", }, { cve: "CVE-2019-19543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19543", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19543", url: "https://www.suse.com/security/cve/CVE-2019-19543", }, { category: "external", summary: "SUSE Bug 1158427 for CVE-2019-19543", url: "https://bugzilla.suse.com/1158427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.36.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.36.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.36.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-12-12T09:15:03Z", details: "low", }, ], title: "CVE-2019-19543", }, ], }
var-201911-1413
Vulnerability from variot
A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41. Linux Kernel Contains a resource exhaustion vulnerability. Vendors have confirmed this vulnerability CID-ab612b1daf41 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. ========================================================================= Ubuntu Security Notice USN-4226-1 January 07, 2020
linux, linux-aws, linux-aws-5.0, linux-azure, linux-gcp, linux-gke-5.0, linux-kvm, linux-oem-osp1, linux-oracle, linux-oracle-5.0, linux-raspi2 vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi2: Linux kernel for Raspberry Pi 2 - linux-aws-5.0: Linux kernel for Amazon Web Services (AWS) systems - linux-gke-5.0: Linux kernel for Google Container Engine (GKE) systems - linux-oem-osp1: Linux kernel for OEM processors - linux-oracle-5.0: Linux kernel for Oracle Cloud systems
Details:
Michael Hanselmann discovered that the CIFS implementation in the Linux kernel did not sanitize paths returned by an SMB server. An attacker controlling an SMB server could use this to overwrite arbitrary files. (CVE-2019-10220)
It was discovered that a heap-based buffer overflow existed in the Marvell WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-14895, CVE-2019-14901)
It was discovered that a heap-based buffer overflow existed in the Marvell Libertas WLAN Driver for the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-14896, CVE-2019-14897)
It was discovered that the Fujitsu ES network device driver for the Linux kernel did not properly check for errors in some situations, leading to a NULL pointer dereference. A local attacker could use this to cause a denial of service. (CVE-2019-16231)
It was discovered that the QLogic Fibre Channel driver in the Linux kernel did not properly check for error, leading to a NULL pointer dereference. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-16233)
Nicolas Waisman discovered that the WiFi driver stack in the Linux kernel did not properly validate SSID lengths. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2019-17133)
Anthony Steinhauser discovered that the Linux kernel did not properly perform Spectre_RSB mitigations to all processors for PowerPC architecture systems in some situations. A local attacker could use this to expose sensitive information. (CVE-2019-18660)
It was discovered that the Mellanox Technologies Innova driver in the Linux kernel did not properly deallocate memory in certain failure conditions. (CVE-2019-19045)
It was discovered that the VirtualBox guest driver implementation in the Linux kernel did not properly deallocate memory in certain error conditions. (CVE-2019-19048)
It was discovered that Geschwister Schneider USB CAN interface driver in the Linux kernel did not properly deallocate memory in certain failure conditions. (CVE-2019-19052)
It was discovered that the netlink-based 802.11 configuration interface in the Linux kernel did not deallocate memory in certain error conditions. (CVE-2019-19055)
It was discovered that the ADIS16400 IIO IMU Driver for the Linux kernel did not properly deallocate memory in certain error conditions. (CVE-2019-19060)
It was discovered that the Intel OPA Gen1 Infiniband Driver for the Linux kernel did not properly deallocate memory in certain error conditions. (CVE-2019-19065)
It was discovered that the AMD Audio CoProcessor Driver for the Linux kernel did not properly deallocate memory in certain error conditions. (CVE-2019-19067)
It was discovered that the event tracing subsystem of the Linux kernel did not properly deallocate memory in certain error conditions. (CVE-2019-19072)
It was discovered that the Cascoda CA8210 SPI 802.15.4 wireless controller driver for the Linux kernel did not properly deallocate memory in certain error conditions. (CVE-2019-19075)
It was discovered that the AMD Display Engine Driver in the Linux kernel did not properly deallocate memory in certain error conditions. A physically proximate attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2019-19524)
It was discovered that the NXP PN533 NFC USB driver in the Linux kernel did not properly free resources after a late probe error, leading to a use- after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19526)
It was discovered that the Microchip CAN BUS Analyzer driver in the Linux kernel contained a use-after-free vulnerability on device disconnect. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19529)
It was discovered that multiple USB HID device drivers in the Linux kernel did not properly validate device metadata on attachment, leading to out-of- bounds writes. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19532)
It was discovered that the PEAK-System Technik USB driver in the Linux kernel did not properly sanitize memory before sending it to the device. A physically proximate attacker could use this to expose sensitive information (kernel memory). (CVE-2019-19534)
It was discovered that in some situations the fair scheduler in the Linux kernel did not permit a process to use its full quota time slice. A local attacker could use this to cause a denial of service. (CVE-2019-19922)
It was discovered that the binder IPC implementation in the Linux kernel did not properly perform bounds checking in some situations, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-2214)
Nicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the Linux kernel performed DMA from a kernel stack. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-17075)
It was discovered that the DesignWare USB3 controller driver in the Linux kernel did not properly deallocate memory in some error conditions. (CVE-2019-18813)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04: linux-image-5.0.0-1009-oracle 5.0.0-1009.14 linux-image-5.0.0-1023-aws 5.0.0-1023.26 linux-image-5.0.0-1024-kvm 5.0.0-1024.26 linux-image-5.0.0-1024-raspi2 5.0.0-1024.25 linux-image-5.0.0-1028-azure 5.0.0-1028.30 linux-image-5.0.0-1028-gcp 5.0.0-1028.29 linux-image-5.0.0-38-generic 5.0.0-38.41 linux-image-5.0.0-38-generic-lpae 5.0.0-38.41 linux-image-5.0.0-38-lowlatency 5.0.0-38.41 linux-image-aws 5.0.0.1023.25 linux-image-azure 5.0.0.1028.28 linux-image-gcp 5.0.0.1028.53 linux-image-generic 5.0.0.38.40 linux-image-generic-lpae 5.0.0.38.40 linux-image-gke 5.0.0.1028.53 linux-image-kvm 5.0.0.1024.25 linux-image-lowlatency 5.0.0.38.40 linux-image-oracle 5.0.0.1009.35 linux-image-raspi2 5.0.0.1024.22 linux-image-virtual 5.0.0.38.40
Ubuntu 18.04 LTS: linux-image-5.0.0-1009-oracle 5.0.0-1009.14~18.04.1 linux-image-5.0.0-1023-aws 5.0.0-1023.26~18.04.1 linux-image-5.0.0-1027-gke 5.0.0-1027.28~18.04.1 linux-image-5.0.0-1028-azure 5.0.0-1028.30~18.04.1 linux-image-5.0.0-1033-oem-osp1 5.0.0-1033.38 linux-image-aws-edge 5.0.0.1023.37 linux-image-azure 5.0.0.1028.39 linux-image-gke-5.0 5.0.0.1027.16 linux-image-oem-osp1 5.0.0.1033.37 linux-image-oracle-edge 5.0.0.1009.8
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://usn.ubuntu.com/4226-1 CVE-2019-10220, CVE-2019-14895, CVE-2019-14896, CVE-2019-14897, CVE-2019-14901, CVE-2019-16231, CVE-2019-16233, CVE-2019-17075, CVE-2019-17133, CVE-2019-18660, CVE-2019-18813, CVE-2019-19045, CVE-2019-19048, CVE-2019-19052, CVE-2019-19055, CVE-2019-19060, CVE-2019-19065, CVE-2019-19067, CVE-2019-19072, CVE-2019-19075, CVE-2019-19083, CVE-2019-19524, CVE-2019-19526, CVE-2019-19529, CVE-2019-19532, CVE-2019-19534, CVE-2019-19922, CVE-2019-2214
Package Information: https://launchpad.net/ubuntu/+source/linux/5.0.0-38.41 https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1023.26 https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1028.30 https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1028.29 https://launchpad.net/ubuntu/+source/linux-kvm/5.0.0-1024.26 https://launchpad.net/ubuntu/+source/linux-oracle/5.0.0-1009.14 https://launchpad.net/ubuntu/+source/linux-raspi2/5.0.0-1024.25 https://launchpad.net/ubuntu/+source/linux-aws-5.0/5.0.0-1023.26~18.04.1 https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1028.30~18.04.1 https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1027.28~18.04.1 https://launchpad.net/ubuntu/+source/linux-oem-osp1/5.0.0-1033.38 https://launchpad.net/ubuntu/+source/linux-oracle-5.0/5.0.0-1009.14~18.04.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1413", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "kernel", scope: "lt", trust: 1.8, vendor: "linux", version: "5.3.9", }, { model: "data availability services", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "kernel", scope: "lt", trust: 1, vendor: "linux", version: "4.4.262", }, { model: "hci compute node", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "leap", scope: "eq", trust: 1, vendor: "opensuse", version: "15.1", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.50.1", }, { model: "steelstore cloud integrated storage", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.30", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.25", }, { model: "aff baseboard management controller", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.40.3r2", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.60.1", }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "4.15", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.70.1", }, { model: "solidfire\\, enterprise sds \\& hci storage node", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "cloud backup", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "3.8", }, { model: "fas\\/aff baseboard management controller", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "19.10", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.30.5r3", }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "4.20", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.50.2", }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "4.10", }, { model: "kernel", scope: "lt", trust: 1, vendor: "linux", version: "4.9.262", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.40", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.40.5", }, { model: "hci baseboard management controller", scope: "eq", trust: 1, vendor: "netapp", version: "h610s", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.60", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.60.3", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.60.0", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "16.04", }, { model: "active iq unified manager", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "18.04", }, { model: "kernel", scope: "gte", trust: 1, vendor: "linux", version: "4.5", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.0", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.70.2", }, { model: "kernel", scope: "lt", trust: 1, vendor: "linux", version: "4.14.226", }, { model: "solidfire \\& hci management node", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "brocade fabric operating system", scope: "eq", trust: 1, vendor: "broadcom", version: null, }, { model: "solidfire baseboard management controller", scope: "eq", trust: 1, vendor: "netapp", version: null, }, { model: "kernel", scope: "lt", trust: 1, vendor: "linux", version: "4.19.82", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.20", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "19.04", }, { model: "e-series santricity os controller", scope: "eq", trust: 1, vendor: "netapp", version: "11.0.0", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "14.04", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-011971", }, { db: "NVD", id: "CVE-2019-19060", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.9.262", versionStartIncluding: "4.5", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.14.226", versionStartIncluding: "4.10", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.19.82", versionStartIncluding: "4.15", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.3.9", versionStartIncluding: "4.20", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.4.262", versionStartIncluding: "3.8", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:fas\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2019-19060", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Ubuntu", sources: [ { db: "PACKETSTORM", id: "155529", }, { db: "PACKETSTORM", id: "155854", }, { db: "PACKETSTORM", id: "157755", }, { db: "CNNVD", id: "CNNVD-201911-1081", }, ], trust: 0.9, }, cve: "CVE-2019-19060", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 6.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 7.8, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2019-19060", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.9, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "VHN-151469", impactScore: 6.9, integrityImpact: "NONE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 7.5, baseSeverity: "High", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2019-19060", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2019-19060", trust: 1.8, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201911-1081", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-151469", trust: 0.1, value: "HIGH", }, { author: "VULMON", id: "CVE-2019-19060", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-151469", }, { db: "VULMON", id: "CVE-2019-19060", }, { db: "JVNDB", id: "JVNDB-2019-011971", }, { db: "NVD", id: "CVE-2019-19060", }, { db: "CNNVD", id: "CNNVD-201911-1081", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41. Linux Kernel Contains a resource exhaustion vulnerability. Vendors have confirmed this vulnerability CID-ab612b1daf41 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. =========================================================================\nUbuntu Security Notice USN-4226-1\nJanuary 07, 2020\n\nlinux, linux-aws, linux-aws-5.0, linux-azure, linux-gcp, linux-gke-5.0,\nlinux-kvm, linux-oem-osp1, linux-oracle, linux-oracle-5.0, linux-raspi2\nvulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 19.04\n- Ubuntu 18.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux: Linux kernel\n- linux-aws: Linux kernel for Amazon Web Services (AWS) systems\n- linux-azure: Linux kernel for Microsoft Azure Cloud systems\n- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems\n- linux-kvm: Linux kernel for cloud environments\n- linux-oracle: Linux kernel for Oracle Cloud systems\n- linux-raspi2: Linux kernel for Raspberry Pi 2\n- linux-aws-5.0: Linux kernel for Amazon Web Services (AWS) systems\n- linux-gke-5.0: Linux kernel for Google Container Engine (GKE) systems\n- linux-oem-osp1: Linux kernel for OEM processors\n- linux-oracle-5.0: Linux kernel for Oracle Cloud systems\n\nDetails:\n\nMichael Hanselmann discovered that the CIFS implementation in the Linux\nkernel did not sanitize paths returned by an SMB server. An attacker\ncontrolling an SMB server could use this to overwrite arbitrary files. \n(CVE-2019-10220)\n\nIt was discovered that a heap-based buffer overflow existed in the Marvell\nWiFi-Ex Driver for the Linux kernel. A physically proximate attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-14895, CVE-2019-14901)\n\nIt was discovered that a heap-based buffer overflow existed in the Marvell\nLibertas WLAN Driver for the Linux kernel. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2019-14896, CVE-2019-14897)\n\nIt was discovered that the Fujitsu ES network device driver for the Linux\nkernel did not properly check for errors in some situations, leading to a\nNULL pointer dereference. A local attacker could use this to cause a denial\nof service. (CVE-2019-16231)\n\nIt was discovered that the QLogic Fibre Channel driver in the Linux kernel\ndid not properly check for error, leading to a NULL pointer dereference. A\nlocal attacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2019-16233)\n\nNicolas Waisman discovered that the WiFi driver stack in the Linux kernel\ndid not properly validate SSID lengths. A physically proximate attacker\ncould use this to cause a denial of service (system crash). \n(CVE-2019-17133)\n\nAnthony Steinhauser discovered that the Linux kernel did not properly\nperform Spectre_RSB mitigations to all processors for PowerPC architecture\nsystems in some situations. A local attacker could use this to expose\nsensitive information. (CVE-2019-18660)\n\nIt was discovered that the Mellanox Technologies Innova driver in the Linux\nkernel did not properly deallocate memory in certain failure conditions. (CVE-2019-19045)\n\nIt was discovered that the VirtualBox guest driver implementation in the\nLinux kernel did not properly deallocate memory in certain error\nconditions. (CVE-2019-19048)\n\nIt was discovered that Geschwister Schneider USB CAN interface driver in\nthe Linux kernel did not properly deallocate memory in certain failure\nconditions. (CVE-2019-19052)\n\nIt was discovered that the netlink-based 802.11 configuration interface in\nthe Linux kernel did not deallocate memory in certain error conditions. (CVE-2019-19055)\n\nIt was discovered that the ADIS16400 IIO IMU Driver for the Linux kernel\ndid not properly deallocate memory in certain error conditions. \n(CVE-2019-19060)\n\nIt was discovered that the Intel OPA Gen1 Infiniband Driver for the Linux\nkernel did not properly deallocate memory in certain error conditions. (CVE-2019-19065)\n\nIt was discovered that the AMD Audio CoProcessor Driver for the Linux\nkernel did not properly deallocate memory in certain error conditions. (CVE-2019-19067)\n\nIt was discovered that the event tracing subsystem of the Linux kernel did\nnot properly deallocate memory in certain error conditions. (CVE-2019-19072)\n\nIt was discovered that the Cascoda CA8210 SPI 802.15.4 wireless controller\ndriver for the Linux kernel did not properly deallocate memory in certain\nerror conditions. (CVE-2019-19075)\n\nIt was discovered that the AMD Display Engine Driver in the Linux kernel\ndid not properly deallocate memory in certain error conditions. A\nphysically proximate attacker could possibly use this to cause a denial of\nservice (system crash) or execute arbitrary code. (CVE-2019-19524)\n\nIt was discovered that the NXP PN533 NFC USB driver in the Linux kernel did\nnot properly free resources after a late probe error, leading to a use-\nafter-free vulnerability. A physically proximate attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2019-19526)\n\nIt was discovered that the Microchip CAN BUS Analyzer driver in the Linux\nkernel contained a use-after-free vulnerability on device disconnect. A\nphysically proximate attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2019-19529)\n\nIt was discovered that multiple USB HID device drivers in the Linux kernel\ndid not properly validate device metadata on attachment, leading to out-of-\nbounds writes. A physically proximate attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code. \n(CVE-2019-19532)\n\nIt was discovered that the PEAK-System Technik USB driver in the Linux\nkernel did not properly sanitize memory before sending it to the device. A\nphysically proximate attacker could use this to expose sensitive\ninformation (kernel memory). (CVE-2019-19534)\n\nIt was discovered that in some situations the fair scheduler in the Linux\nkernel did not permit a process to use its full quota time slice. A local\nattacker could use this to cause a denial of service. (CVE-2019-19922)\n\nIt was discovered that the binder IPC implementation in the Linux kernel\ndid not properly perform bounds checking in some situations, leading to an\nout-of-bounds write. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2019-2214)\n\nNicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the Linux\nkernel performed DMA from a kernel stack. A local attacker could use this\nto cause a denial of service (system crash). (CVE-2019-17075)\n\nIt was discovered that the DesignWare USB3 controller driver in the Linux\nkernel did not properly deallocate memory in some error conditions. (CVE-2019-18813)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 19.04:\n linux-image-5.0.0-1009-oracle 5.0.0-1009.14\n linux-image-5.0.0-1023-aws 5.0.0-1023.26\n linux-image-5.0.0-1024-kvm 5.0.0-1024.26\n linux-image-5.0.0-1024-raspi2 5.0.0-1024.25\n linux-image-5.0.0-1028-azure 5.0.0-1028.30\n linux-image-5.0.0-1028-gcp 5.0.0-1028.29\n linux-image-5.0.0-38-generic 5.0.0-38.41\n linux-image-5.0.0-38-generic-lpae 5.0.0-38.41\n linux-image-5.0.0-38-lowlatency 5.0.0-38.41\n linux-image-aws 5.0.0.1023.25\n linux-image-azure 5.0.0.1028.28\n linux-image-gcp 5.0.0.1028.53\n linux-image-generic 5.0.0.38.40\n linux-image-generic-lpae 5.0.0.38.40\n linux-image-gke 5.0.0.1028.53\n linux-image-kvm 5.0.0.1024.25\n linux-image-lowlatency 5.0.0.38.40\n linux-image-oracle 5.0.0.1009.35\n linux-image-raspi2 5.0.0.1024.22\n linux-image-virtual 5.0.0.38.40\n\nUbuntu 18.04 LTS:\n linux-image-5.0.0-1009-oracle 5.0.0-1009.14~18.04.1\n linux-image-5.0.0-1023-aws 5.0.0-1023.26~18.04.1\n linux-image-5.0.0-1027-gke 5.0.0-1027.28~18.04.1\n linux-image-5.0.0-1028-azure 5.0.0-1028.30~18.04.1\n linux-image-5.0.0-1033-oem-osp1 5.0.0-1033.38\n linux-image-aws-edge 5.0.0.1023.37\n linux-image-azure 5.0.0.1028.39\n linux-image-gke-5.0 5.0.0.1027.16\n linux-image-oem-osp1 5.0.0.1033.37\n linux-image-oracle-edge 5.0.0.1009.8\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://usn.ubuntu.com/4226-1\n CVE-2019-10220, CVE-2019-14895, CVE-2019-14896, CVE-2019-14897,\n CVE-2019-14901, CVE-2019-16231, CVE-2019-16233, CVE-2019-17075,\n CVE-2019-17133, CVE-2019-18660, CVE-2019-18813, CVE-2019-19045,\n CVE-2019-19048, CVE-2019-19052, CVE-2019-19055, CVE-2019-19060,\n CVE-2019-19065, CVE-2019-19067, CVE-2019-19072, CVE-2019-19075,\n CVE-2019-19083, CVE-2019-19524, CVE-2019-19526, CVE-2019-19529,\n CVE-2019-19532, CVE-2019-19534, CVE-2019-19922, CVE-2019-2214\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux/5.0.0-38.41\n https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1023.26\n https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1028.30\n https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1028.29\n https://launchpad.net/ubuntu/+source/linux-kvm/5.0.0-1024.26\n https://launchpad.net/ubuntu/+source/linux-oracle/5.0.0-1009.14\n https://launchpad.net/ubuntu/+source/linux-raspi2/5.0.0-1024.25\n https://launchpad.net/ubuntu/+source/linux-aws-5.0/5.0.0-1023.26~18.04.1\n https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1028.30~18.04.1\n https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1027.28~18.04.1\n https://launchpad.net/ubuntu/+source/linux-oem-osp1/5.0.0-1033.38\n https://launchpad.net/ubuntu/+source/linux-oracle-5.0/5.0.0-1009.14~18.04.1\n", sources: [ { db: "NVD", id: "CVE-2019-19060", }, { db: "JVNDB", id: "JVNDB-2019-011971", }, { db: "VULHUB", id: "VHN-151469", }, { db: "VULMON", id: "CVE-2019-19060", }, { db: "PACKETSTORM", id: "155529", }, { db: "PACKETSTORM", id: "155854", }, { db: "PACKETSTORM", id: "157755", }, ], trust: 2.07, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2019-19060", trust: 2.9, }, { db: "PACKETSTORM", id: "157755", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2019-011971", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201911-1081", trust: 0.7, }, { db: "PACKETSTORM", id: "155529", trust: 0.7, }, { db: "PACKETSTORM", id: "155854", trust: 0.7, }, { db: "AUSCERT", id: "ESB-2020.0851", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.4793", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.4539", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.4346.2", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.4704", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2020.1768.2", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2020.0830", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2020.0141", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.4584", trust: 0.6, }, { db: "VULHUB", id: "VHN-151469", trust: 0.1, }, { db: "VULMON", id: "CVE-2019-19060", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-151469", }, { db: "VULMON", id: "CVE-2019-19060", }, { db: "JVNDB", id: "JVNDB-2019-011971", }, { db: "PACKETSTORM", id: "155529", }, { db: "PACKETSTORM", id: "155854", }, { db: "PACKETSTORM", id: "157755", }, { db: "NVD", id: "CVE-2019-19060", }, { db: "CNNVD", id: "CNNVD-201911-1081", }, ], }, id: "VAR-201911-1413", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-151469", }, ], trust: 0.01, }, last_update_date: "2023-12-18T11:01:20.127000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "ChangeLog-5.3.9", trust: 0.8, url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.3.9", }, { title: "iio: imu: adis16400: release allocated memory on failure", trust: 0.8, url: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", }, { title: "Linux Kernel Archives", trust: 0.8, url: "http://www.kernel.org", }, { title: "Linux kernel Remediation of resource management error vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=103001", }, { title: "Ubuntu Security Notice: linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-4210-1", }, { title: "Ubuntu Security Notice: linux, linux-aws, linux-lts-xenial, linux-raspi2, linux-snapdragon vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-4364-1", }, { title: "Ubuntu Security Notice: linux, linux-aws, linux-gcp, linux-gcp-5.3, linux-kvm, linux-oracle vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-4208-1", }, { title: "Ubuntu Security Notice: linux, linux-aws, linux-aws-5.0, linux-azure, linux-gcp, linux-gke-5.0, linux-kvm, linux-oem-osp1, linux-oracle, linux-oracle-5.0, linux-raspi2 vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-4226-1", }, { title: "Amazon Linux 2: ALAS2-2021-1627", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=alas2-2021-1627", }, { title: "", trust: 0.1, url: "https://github.com/live-hack-cve/cve-2019-19060 ", }, { title: "cve_diff_checker", trust: 0.1, url: "https://github.com/lcatro/cve_diff_checker ", }, ], sources: [ { db: "VULMON", id: "CVE-2019-19060", }, { db: "JVNDB", id: "JVNDB-2019-011971", }, { db: "CNNVD", id: "CNNVD-201911-1081", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-401", trust: 1.1, }, { problemtype: "CWE-400", trust: 0.8, }, ], sources: [ { db: "VULHUB", id: "VHN-151469", }, { db: "JVNDB", id: "JVNDB-2019-011971", }, { db: "NVD", id: "CVE-2019-19060", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.5, url: "https://usn.ubuntu.com/4210-1/", }, { trust: 1.8, url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { trust: 1.8, url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.3.9", }, { trust: 1.8, url: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", }, { trust: 1.8, url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html", }, { trust: 1.8, url: "https://usn.ubuntu.com/4208-1/", }, { trust: 1.8, url: "https://usn.ubuntu.com/4226-1/", }, { trust: 1.8, url: "https://usn.ubuntu.com/4364-1/", }, { trust: 1.7, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19060", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19060", }, { trust: 0.6, url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193381-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2020.1768.2/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.4539/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.4704/", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/157755/ubuntu-security-notice-usn-4364-1.html", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/155529/ubuntu-security-notice-usn-4210-1.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.4793/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2020.0851/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.4584/", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2020.0830/", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2019-19060", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2020.0141/", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/linux-kernel-five-vulnerabilities-via-memory-leak-30908", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/155854/ubuntu-security-notice-usn-4226-1.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2019.4346.2/", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19065", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-17075", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-17133", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19075", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/401.html", }, { trust: 0.1, url: "https://github.com/live-hack-cve/cve-2019-19060", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1051.51", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-16746", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1049.52", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1065.75", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1050.53", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1056.58~16.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1030.33~16.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1069.76", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1052.56", }, { trust: 0.1, url: "https://usn.ubuntu.com/4210-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1030.33", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1056.58", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-72.81~16.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux/4.15.0-72.81", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1028.30", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1028.30~18.04.1", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19048", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-raspi2/5.0.0-1024.25", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-16231", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-kvm/5.0.0-1024.26", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-oracle-5.0/5.0.0-1009.14~18.04.1", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-16233", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-18813", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-18660", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1028.29", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19052", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1023.26", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-10220", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19067", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19045", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-2214", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19526", }, { trust: 0.1, url: "https://usn.ubuntu.com/4226-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1027.28~18.04.1", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19922", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-14901", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux/5.0.0-38.41", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19524", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19083", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19529", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19072", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-oem-osp1/5.0.0-1033.38", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-oracle/5.0.0-1009.14", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19055", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19534", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19532", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-aws-5.0/5.0.0-1023.26~18.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux/4.4.0-179.209", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-11668", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1107.118", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-11565", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-11608", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-11494", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-11609", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1133.142", }, { trust: 0.1, url: "https://usn.ubuntu.com/4364-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1137.145", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-10942", }, ], sources: [ { db: "VULHUB", id: "VHN-151469", }, { db: "VULMON", id: "CVE-2019-19060", }, { db: "JVNDB", id: "JVNDB-2019-011971", }, { db: "PACKETSTORM", id: "155529", }, { db: "PACKETSTORM", id: "155854", }, { db: "PACKETSTORM", id: "157755", }, { db: "NVD", id: "CVE-2019-19060", }, { db: "CNNVD", id: "CNNVD-201911-1081", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-151469", }, { db: "VULMON", id: "CVE-2019-19060", }, { db: "JVNDB", id: "JVNDB-2019-011971", }, { db: "PACKETSTORM", id: "155529", }, { db: "PACKETSTORM", id: "155854", }, { db: "PACKETSTORM", id: "157755", }, { db: "NVD", id: "CVE-2019-19060", }, { db: "CNNVD", id: "CNNVD-201911-1081", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-11-18T00:00:00", db: "VULHUB", id: "VHN-151469", }, { date: "2019-11-18T00:00:00", db: "VULMON", id: "CVE-2019-19060", }, { date: "2019-11-21T00:00:00", db: "JVNDB", id: "JVNDB-2019-011971", }, { date: "2019-12-03T14:22:22", db: "PACKETSTORM", id: "155529", }, { date: "2020-01-07T16:46:38", db: "PACKETSTORM", id: "155854", }, { date: "2020-05-19T14:38:51", db: "PACKETSTORM", id: "157755", }, { date: "2019-11-18T06:15:12.343000", db: "NVD", id: "CVE-2019-19060", }, { date: "2019-11-18T00:00:00", db: "CNNVD", id: "CNNVD-201911-1081", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-01-19T00:00:00", db: "VULHUB", id: "VHN-151469", }, { date: "2022-11-08T00:00:00", db: "VULMON", id: "CVE-2019-19060", }, { date: "2019-11-21T00:00:00", db: "JVNDB", id: "JVNDB-2019-011971", }, { date: "2023-01-19T20:08:01.737000", db: "NVD", id: "CVE-2019-19060", }, { date: "2020-08-25T00:00:00", db: "CNNVD", id: "CNNVD-201911-1081", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201911-1081", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Linux Kernel Vulnerable to resource exhaustion", sources: [ { db: "JVNDB", id: "JVNDB-2019-011971", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "resource management error", sources: [ { db: "CNNVD", id: "CNNVD-201911-1081", }, ], trust: 0.6, }, }
gsd-2019-19060
Vulnerability from gsd
{ GSD: { alias: "CVE-2019-19060", description: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", id: "GSD-2019-19060", references: [ "https://www.suse.com/security/cve/CVE-2019-19060.html", "https://ubuntu.com/security/CVE-2019-19060", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2019-19060", ], details: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", id: "GSD-2019-19060", modified: "2023-12-13T01:23:54.603497Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-19060", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9", refsource: "MISC", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9", }, { name: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", refsource: "MISC", url: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", }, { name: "USN-4208-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4208-1/", }, { name: "USN-4210-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4210-1/", }, { name: "https://security.netapp.com/advisory/ntap-20191205-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { name: "openSUSE-SU-2019:2675", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html", }, { name: "USN-4226-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4226-1/", }, { name: "USN-4364-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4364-1/", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.9.262", versionStartIncluding: "4.5", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.14.226", versionStartIncluding: "4.10", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.19.82", versionStartIncluding: "4.15", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.3.9", versionStartIncluding: "4.20", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "4.4.262", versionStartIncluding: "3.8", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:fas\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-19060", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-401", }, ], }, ], }, references: { reference_data: [ { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9", refsource: "MISC", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9", }, { name: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", }, { name: "USN-4208-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4208-1/", }, { name: "USN-4210-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4210-1/", }, { name: "https://security.netapp.com/advisory/ntap-20191205-0001/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { name: "openSUSE-SU-2019:2675", refsource: "SUSE", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html", }, { name: "USN-4226-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4226-1/", }, { name: "USN-4364-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4364-1/", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, }, }, lastModifiedDate: "2023-01-19T20:08Z", publishedDate: "2019-11-18T06:15Z", }, }, }
wid-sec-w-2023-0198
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0198 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-0198.json", }, { category: "self", summary: "WID-SEC-2023-0198 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0198", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0152-1 vom 2023-01-26", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0134-1 vom 2023-01-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4226-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4226-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4227-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4227-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4228-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4228-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4225-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4225-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4225-2 vom 2020-01-18", url: "https://packetstormsecurity.com/files/155995/USN-4225-2.txt", }, { category: "external", summary: "Ubuntu Security Notice USN-4254-1 vom 2020-01-28", url: "https://usn.ubuntu.com/4254-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4228-2 vom 2020-01-07", url: "https://usn.ubuntu.com/4228-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4227-2 vom 2020-01-07", url: "https://usn.ubuntu.com/4227-2/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19043", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19044", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19045", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19046", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19047", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19048", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19049", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19050", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19051", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19052", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19053", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19054", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19055", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19056", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19057", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19058", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19059", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19060", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19061", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19062", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19063", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19064", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19065", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19066", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19067", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19068", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19069", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19070", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19071", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19072", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19073", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19074", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19075", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19076", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19077", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19078", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19079", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19080", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19081", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19082", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19083", }, { category: "external", summary: "Ubuntu Security Notice USN-4209-1 vom 2019-12-03", url: "https://usn.ubuntu.com/4209-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4208-1 vom 2019-12-03", url: "https://usn.ubuntu.com/4208-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4210-1 vom 2019-12-03", url: "https://usn.ubuntu.com/4210-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3371-1 vom 2019-12-20", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193371-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3379-1 vom 2019-12-21", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193379-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3381-1 vom 2019-12-23", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193381-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3389-1 vom 2019-12-28", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193389-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4258-1 vom 2020-01-29", url: "https://usn.ubuntu.com/4258-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4254-2 vom 2020-01-29", url: "https://usn.ubuntu.com/4254-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4284-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4284-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4287-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4287-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4286-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4286-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4285-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4285-1/", }, { category: "external", summary: "EMC Security Advisory DSA-2020-053 vom 2020-02-27", url: "https://www.dell.com/support/security/de-de/details/DOC-111088/DSA-2020-053-RSA&", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0511-1 vom 2020-02-28", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200511-1.html", }, { category: "external", summary: "Debian Security Advisory DLA 2068 vom 2020-03-02", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202001/msg00013.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0560-1 vom 2020-03-03", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200560-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0559-1 vom 2020-03-02", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200559-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0558-1 vom 2020-03-02", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200558-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0580-1 vom 2020-03-04", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200580-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0584-1 vom 2020-03-04", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200584-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0599-1 vom 2020-03-06", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200599-1.html", }, { category: "external", summary: "Debian Security Advisory DLA 2131 vom 2020-03-05", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202003/msg00001.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0605-1 vom 2020-03-06", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200605-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0613-1 vom 2020-03-10", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200613-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4300-1 vom 2020-03-17", url: "https://usn.ubuntu.com/4300-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4302-1 vom 2020-03-17", url: "https://usn.ubuntu.com/4302-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4319-1 vom 2020-04-06", url: "https://usn.ubuntu.com/4319-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4325-1 vom 2020-04-08", url: "https://usn.ubuntu.com/4325-1/", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1769 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1769", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1567 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1567", }, { category: "external", summary: "Ubuntu Security Notice USN-4344-1 vom 2020-04-29", url: "https://usn.ubuntu.com/4344-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:14354-1 vom 2020-05-01", url: "https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5670 vom 2020-05-07", url: "https://oss.oracle.com/pipermail/el-errata/2020-May/009889.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5670 vom 2020-05-07", url: "https://oss.oracle.com/pipermail/el-errata/2020-May/009888.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-1769 vom 2020-05-13", url: "https://oss.oracle.com/pipermail/el-errata/2020-May/009919.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1255-1 vom 2020-05-15", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20201255-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4364-1 vom 2020-05-19", url: "https://usn.ubuntu.com/4364-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1275-1 vom 2020-05-21", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20201275-1.html", }, { category: "external", summary: "ORACLE OVMSA-2020-0019 vom 2020-06-04", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000980.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5708 vom 2020-06-04", url: "https://oss.oracle.com/pipermail/el-errata/2020-June/009990.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5708 vom 2020-06-04", url: "https://oss.oracle.com/pipermail/el-errata/2020-June/009989.html", }, { category: "external", summary: "ORACLE OVMSA-2020-0020 vom 2020-06-06", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000983.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1663-1 vom 2020-06-18", url: "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:2854 vom 2020-07-07", url: "https://access.redhat.com/errata/RHSA-2020:2854", }, { category: "external", summary: "ORACLE OVMSA-2020-0032 vom 2020-08-08", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-August/000992.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:3545 vom 2020-08-25", url: "https://access.redhat.com/errata/RHSA-2020:3545", }, { category: "external", summary: "ORACLE OVMSA-2020-0041 vom 2020-09-04", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-September/000999.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4526-1 vom 2020-09-22", url: "https://usn.ubuntu.com/4526-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4526-1 vom 2020-09-22", url: "https://ubuntu.com/security/notices/USN-4526-1", }, { category: "external", summary: "Ubuntu Security Notice USN-4525-1 vom 2020-09-22", url: "https://usn.ubuntu.com/4525-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4527-1 vom 2020-09-22", url: "https://usn.ubuntu.com/4527-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4904-1 vom 2021-04-14", url: "https://ubuntu.com/security/notices/USN-4904-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4062 vom 2020-09-29", url: "https://access.redhat.com/errata/RHSA-2020:4062", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4060 vom 2020-09-29", url: "https://access.redhat.com/errata/RHSA-2020:4060", }, { category: "external", summary: "ORACLE OVMSA-2020-0044 vom 2020-10-09", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-October/001000.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-140 vom 2020-10-14", url: "https://downloads.avaya.com/css/P8/documents/101071393", }, { category: "external", summary: "Debian Security Advisory DLA-2420 vom 2020-10-30", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202010/msg00032.html", }, { category: "external", summary: "Debian Security Advisory DLA-2420 vom 2020-10-31", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202010/msg00034.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4431 vom 2020-11-04", url: "https://access.redhat.com/errata/RHSA-2020:4431", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4609 vom 2020-11-04", url: "https://access.redhat.com/errata/RHSA-2020:4609", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:5206 vom 2020-11-24", url: "https://access.redhat.com/errata/RHSA-2020:5206", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:3503-1 vom 2020-11-24", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2021-1627 vom 2021-04-22", url: "https://alas.aws.amazon.com/AL2/ALAS-2021-1627.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-155 vom 2020-12-08", url: "https://downloads.avaya.com/css/P8/documents/101072832", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:5656 vom 2020-12-22", url: "https://access.redhat.com/errata/RHSA-2020:5656", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:0437-1 vom 2021-02-11", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08", url: "http://linux.oracle.com/errata/ELSA-2021-9473.html", }, { category: "external", summary: "ORACLE OVMSA-2021-0035 vom 2021-10-12", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-014 vom 2022-01-31", url: "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-014.html", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service", tracking: { current_release_date: "2023-01-26T23:00:00.000+00:00", generator: { date: "2024-08-15T17:42:18.159+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0198", initial_release_date: "2019-11-17T23:00:00.000+00:00", revision_history: [ { date: "2019-11-17T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2019-11-24T23:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2019-34A75D7E61, FEDORA-2019-021C968423", }, { date: "2019-11-26T23:00:00.000+00:00", number: "3", summary: "Referenz(en) aufgenommen: FEDORA-2019-8846A1A5A2, FEDORA-2019-91F6E7BB71", }, { date: "2019-12-02T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2019-12-08T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-12T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-17T23:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-22T23:00:00.000+00:00", number: "8", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-23T23:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-29T23:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-01-06T23:00:00.000+00:00", number: "11", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-07T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-14T23:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-01-19T23:00:00.000+00:00", number: "14", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-27T23:00:00.000+00:00", number: "15", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-28T23:00:00.000+00:00", number: "16", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-02-18T23:00:00.000+00:00", number: "17", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-02-26T23:00:00.000+00:00", number: "18", summary: "Neue Updates von EMC aufgenommen", }, { date: "2020-02-27T23:00:00.000+00:00", number: "19", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-02T23:00:00.000+00:00", number: "20", summary: "Neue Updates von Debian und SUSE aufgenommen", }, { date: "2020-03-04T23:00:00.000+00:00", number: "21", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-05T23:00:00.000+00:00", number: "22", summary: "Neue Updates von SUSE und Debian aufgenommen", }, { date: "2020-03-08T23:00:00.000+00:00", number: "23", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-09T23:00:00.000+00:00", number: "24", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-16T23:00:00.000+00:00", number: "25", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-04-06T22:00:00.000+00:00", number: "26", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-04-07T22:00:00.000+00:00", number: "27", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-04-28T22:00:00.000+00:00", number: "28", summary: "Neue Updates von Red Hat und Ubuntu aufgenommen", }, { date: "2020-05-03T22:00:00.000+00:00", number: "29", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-05-06T22:00:00.000+00:00", number: "30", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2020-05-13T22:00:00.000+00:00", number: "31", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2020-05-14T22:00:00.000+00:00", number: "32", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-05-18T22:00:00.000+00:00", number: "33", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-05-21T22:00:00.000+00:00", number: "34", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-06-03T22:00:00.000+00:00", number: "35", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-06-04T22:00:00.000+00:00", number: "36", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2020-06-07T22:00:00.000+00:00", number: "37", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-06-18T22:00:00.000+00:00", number: "38", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-07-07T22:00:00.000+00:00", number: "39", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-08-09T22:00:00.000+00:00", number: "40", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-08-25T22:00:00.000+00:00", number: "41", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-09-06T22:00:00.000+00:00", number: "42", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-09-21T22:00:00.000+00:00", number: "43", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-09-29T22:00:00.000+00:00", number: "44", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-10-11T22:00:00.000+00:00", number: "45", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-10-13T22:00:00.000+00:00", number: "46", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2020-11-01T23:00:00.000+00:00", number: "47", summary: "Neue Updates von Debian aufgenommen", }, { date: "2020-11-03T23:00:00.000+00:00", number: "48", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-11-23T23:00:00.000+00:00", number: "49", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-11-24T23:00:00.000+00:00", number: "50", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-12-09T23:00:00.000+00:00", number: "51", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2020-12-21T23:00:00.000+00:00", number: "52", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-02-11T23:00:00.000+00:00", number: "53", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-04-13T22:00:00.000+00:00", number: "54", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2021-04-21T22:00:00.000+00:00", number: "55", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2021-10-10T22:00:00.000+00:00", number: "56", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2021-10-11T22:00:00.000+00:00", number: "57", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2022-01-30T23:00:00.000+00:00", number: "58", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-01-25T23:00:00.000+00:00", number: "59", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-01-26T23:00:00.000+00:00", number: "60", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "60", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, { category: "product_name", name: "Avaya Web License Manager", product: { name: "Avaya Web License Manager", product_id: "T016243", product_identification_helper: { cpe: "cpe:/a:avaya:web_license_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Open Source Linux Kernel < 5.3.11", product: { name: "Open Source Linux Kernel < 5.3.11", product_id: "6368", product_identification_helper: { cpe: "cpe:/o:linux:linux_kernel:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, { category: "product_name", name: "Oracle VM", product: { name: "Oracle VM", product_id: "T011119", product_identification_helper: { cpe: "cpe:/a:oracle:vm:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2019-19043", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19043", }, { cve: "CVE-2019-19044", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19044", }, { cve: "CVE-2019-19045", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19045", }, { cve: "CVE-2019-19046", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19046", }, { cve: "CVE-2019-19047", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19047", }, { cve: "CVE-2019-19048", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19048", }, { cve: "CVE-2019-19049", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19049", }, { cve: "CVE-2019-19050", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19050", }, { cve: "CVE-2019-19051", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19051", }, { cve: "CVE-2019-19052", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19052", }, { cve: "CVE-2019-19053", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19053", }, { cve: "CVE-2019-19054", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19054", }, { cve: "CVE-2019-19055", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19055", }, { cve: "CVE-2019-19056", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19058", }, { cve: "CVE-2019-19059", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19059", }, { cve: "CVE-2019-19060", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19060", }, { cve: "CVE-2019-19061", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19061", }, { cve: "CVE-2019-19062", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19063", }, { cve: "CVE-2019-19064", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19064", }, { cve: "CVE-2019-19065", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19065", }, { cve: "CVE-2019-19066", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19066", }, { cve: "CVE-2019-19067", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19068", }, { cve: "CVE-2019-19069", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19069", }, { cve: "CVE-2019-19070", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19070", }, { cve: "CVE-2019-19071", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19071", }, { cve: "CVE-2019-19072", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19072", }, { cve: "CVE-2019-19073", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19075", }, { cve: "CVE-2019-19076", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19076", }, { cve: "CVE-2019-19077", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19077", }, { cve: "CVE-2019-19078", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19078", }, { cve: "CVE-2019-19079", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19079", }, { cve: "CVE-2019-19080", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19080", }, { cve: "CVE-2019-19081", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19081", }, { cve: "CVE-2019-19082", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19082", }, { cve: "CVE-2019-19083", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19083", }, ], }
WID-SEC-W-2023-0198
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0198 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-0198.json", }, { category: "self", summary: "WID-SEC-2023-0198 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0198", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0152-1 vom 2023-01-26", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:0134-1 vom 2023-01-25", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4226-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4226-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4227-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4227-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4228-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4228-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4225-1 vom 2020-01-07", url: "https://usn.ubuntu.com/4225-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4225-2 vom 2020-01-18", url: "https://packetstormsecurity.com/files/155995/USN-4225-2.txt", }, { category: "external", summary: "Ubuntu Security Notice USN-4254-1 vom 2020-01-28", url: "https://usn.ubuntu.com/4254-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4228-2 vom 2020-01-07", url: "https://usn.ubuntu.com/4228-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4227-2 vom 2020-01-07", url: "https://usn.ubuntu.com/4227-2/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19043", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19044", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19045", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19046", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19047", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19048", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19049", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19050", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19051", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19052", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19053", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19054", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19055", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19056", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19057", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19058", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19059", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19060", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19061", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19062", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19063", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19064", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19065", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19066", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19067", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19068", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19069", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19070", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19071", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19072", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19073", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19074", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19075", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19076", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19077", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19078", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19079", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19080", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19081", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19082", }, { category: "external", summary: "NATIONAL VULNERABILITY DATABASE vom 2019-11-17", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19083", }, { category: "external", summary: "Ubuntu Security Notice USN-4209-1 vom 2019-12-03", url: "https://usn.ubuntu.com/4209-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4208-1 vom 2019-12-03", url: "https://usn.ubuntu.com/4208-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4210-1 vom 2019-12-03", url: "https://usn.ubuntu.com/4210-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3371-1 vom 2019-12-20", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193371-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3379-1 vom 2019-12-21", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193379-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3381-1 vom 2019-12-23", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193381-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:3389-1 vom 2019-12-28", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193389-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4258-1 vom 2020-01-29", url: "https://usn.ubuntu.com/4258-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4254-2 vom 2020-01-29", url: "https://usn.ubuntu.com/4254-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4284-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4284-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4287-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4287-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4286-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4286-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-4285-1 vom 2020-02-18", url: "https://usn.ubuntu.com/4285-1/", }, { category: "external", summary: "EMC Security Advisory DSA-2020-053 vom 2020-02-27", url: "https://www.dell.com/support/security/de-de/details/DOC-111088/DSA-2020-053-RSA&", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0511-1 vom 2020-02-28", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200511-1.html", }, { category: "external", summary: "Debian Security Advisory DLA 2068 vom 2020-03-02", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202001/msg00013.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0560-1 vom 2020-03-03", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200560-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0559-1 vom 2020-03-02", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200559-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0558-1 vom 2020-03-02", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200558-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0580-1 vom 2020-03-04", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200580-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0584-1 vom 2020-03-04", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200584-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0599-1 vom 2020-03-06", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200599-1.html", }, { category: "external", summary: "Debian Security Advisory DLA 2131 vom 2020-03-05", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202003/msg00001.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0605-1 vom 2020-03-06", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200605-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0613-1 vom 2020-03-10", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200613-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4300-1 vom 2020-03-17", url: "https://usn.ubuntu.com/4300-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4302-1 vom 2020-03-17", url: "https://usn.ubuntu.com/4302-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4319-1 vom 2020-04-06", url: "https://usn.ubuntu.com/4319-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4325-1 vom 2020-04-08", url: "https://usn.ubuntu.com/4325-1/", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1769 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1769", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1567 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1567", }, { category: "external", summary: "Ubuntu Security Notice USN-4344-1 vom 2020-04-29", url: "https://usn.ubuntu.com/4344-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:14354-1 vom 2020-05-01", url: "https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5670 vom 2020-05-07", url: "https://oss.oracle.com/pipermail/el-errata/2020-May/009889.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5670 vom 2020-05-07", url: "https://oss.oracle.com/pipermail/el-errata/2020-May/009888.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-1769 vom 2020-05-13", url: "https://oss.oracle.com/pipermail/el-errata/2020-May/009919.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1255-1 vom 2020-05-15", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20201255-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4364-1 vom 2020-05-19", url: "https://usn.ubuntu.com/4364-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1275-1 vom 2020-05-21", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20201275-1.html", }, { category: "external", summary: "ORACLE OVMSA-2020-0019 vom 2020-06-04", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000980.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5708 vom 2020-06-04", url: "https://oss.oracle.com/pipermail/el-errata/2020-June/009990.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2020-5708 vom 2020-06-04", url: "https://oss.oracle.com/pipermail/el-errata/2020-June/009989.html", }, { category: "external", summary: "ORACLE OVMSA-2020-0020 vom 2020-06-06", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000983.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1663-1 vom 2020-06-18", url: "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:2854 vom 2020-07-07", url: "https://access.redhat.com/errata/RHSA-2020:2854", }, { category: "external", summary: "ORACLE OVMSA-2020-0032 vom 2020-08-08", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-August/000992.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:3545 vom 2020-08-25", url: "https://access.redhat.com/errata/RHSA-2020:3545", }, { category: "external", summary: "ORACLE OVMSA-2020-0041 vom 2020-09-04", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-September/000999.html", }, { category: "external", summary: "Ubuntu Security Notice USN-4526-1 vom 2020-09-22", url: "https://usn.ubuntu.com/4526-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4526-1 vom 2020-09-22", url: "https://ubuntu.com/security/notices/USN-4526-1", }, { category: "external", summary: "Ubuntu Security Notice USN-4525-1 vom 2020-09-22", url: "https://usn.ubuntu.com/4525-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4527-1 vom 2020-09-22", url: "https://usn.ubuntu.com/4527-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4904-1 vom 2021-04-14", url: "https://ubuntu.com/security/notices/USN-4904-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4062 vom 2020-09-29", url: "https://access.redhat.com/errata/RHSA-2020:4062", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4060 vom 2020-09-29", url: "https://access.redhat.com/errata/RHSA-2020:4060", }, { category: "external", summary: "ORACLE OVMSA-2020-0044 vom 2020-10-09", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2020-October/001000.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-140 vom 2020-10-14", url: "https://downloads.avaya.com/css/P8/documents/101071393", }, { category: "external", summary: "Debian Security Advisory DLA-2420 vom 2020-10-30", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202010/msg00032.html", }, { category: "external", summary: "Debian Security Advisory DLA-2420 vom 2020-10-31", url: "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202010/msg00034.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4431 vom 2020-11-04", url: "https://access.redhat.com/errata/RHSA-2020:4431", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4609 vom 2020-11-04", url: "https://access.redhat.com/errata/RHSA-2020:4609", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:5206 vom 2020-11-24", url: "https://access.redhat.com/errata/RHSA-2020:5206", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:3503-1 vom 2020-11-24", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2021-1627 vom 2021-04-22", url: "https://alas.aws.amazon.com/AL2/ALAS-2021-1627.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-155 vom 2020-12-08", url: "https://downloads.avaya.com/css/P8/documents/101072832", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:5656 vom 2020-12-22", url: "https://access.redhat.com/errata/RHSA-2020:5656", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:0437-1 vom 2021-02-11", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08", url: "http://linux.oracle.com/errata/ELSA-2021-9473.html", }, { category: "external", summary: "ORACLE OVMSA-2021-0035 vom 2021-10-12", url: "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-014 vom 2022-01-31", url: "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-014.html", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service", tracking: { current_release_date: "2023-01-26T23:00:00.000+00:00", generator: { date: "2024-08-15T17:42:18.159+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0198", initial_release_date: "2019-11-17T23:00:00.000+00:00", revision_history: [ { date: "2019-11-17T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2019-11-24T23:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2019-34A75D7E61, FEDORA-2019-021C968423", }, { date: "2019-11-26T23:00:00.000+00:00", number: "3", summary: "Referenz(en) aufgenommen: FEDORA-2019-8846A1A5A2, FEDORA-2019-91F6E7BB71", }, { date: "2019-12-02T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2019-12-08T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-12T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-17T23:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-22T23:00:00.000+00:00", number: "8", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-23T23:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-12-29T23:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-01-06T23:00:00.000+00:00", number: "11", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-07T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-14T23:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-01-19T23:00:00.000+00:00", number: "14", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-27T23:00:00.000+00:00", number: "15", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-01-28T23:00:00.000+00:00", number: "16", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-02-18T23:00:00.000+00:00", number: "17", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-02-26T23:00:00.000+00:00", number: "18", summary: "Neue Updates von EMC aufgenommen", }, { date: "2020-02-27T23:00:00.000+00:00", number: "19", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-02T23:00:00.000+00:00", number: "20", summary: "Neue Updates von Debian und SUSE aufgenommen", }, { date: "2020-03-04T23:00:00.000+00:00", number: "21", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-05T23:00:00.000+00:00", number: "22", summary: "Neue Updates von SUSE und Debian aufgenommen", }, { date: "2020-03-08T23:00:00.000+00:00", number: "23", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-09T23:00:00.000+00:00", number: "24", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-16T23:00:00.000+00:00", number: "25", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-04-06T22:00:00.000+00:00", number: "26", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-04-07T22:00:00.000+00:00", number: "27", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-04-28T22:00:00.000+00:00", number: "28", summary: "Neue Updates von Red Hat und Ubuntu aufgenommen", }, { date: "2020-05-03T22:00:00.000+00:00", number: "29", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-05-06T22:00:00.000+00:00", number: "30", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2020-05-13T22:00:00.000+00:00", number: "31", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2020-05-14T22:00:00.000+00:00", number: "32", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-05-18T22:00:00.000+00:00", number: "33", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-05-21T22:00:00.000+00:00", number: "34", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-06-03T22:00:00.000+00:00", number: "35", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-06-04T22:00:00.000+00:00", number: "36", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2020-06-07T22:00:00.000+00:00", number: "37", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-06-18T22:00:00.000+00:00", number: "38", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-07-07T22:00:00.000+00:00", number: "39", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-08-09T22:00:00.000+00:00", number: "40", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-08-25T22:00:00.000+00:00", number: "41", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-09-06T22:00:00.000+00:00", number: "42", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-09-21T22:00:00.000+00:00", number: "43", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2020-09-29T22:00:00.000+00:00", number: "44", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-10-11T22:00:00.000+00:00", number: "45", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2020-10-13T22:00:00.000+00:00", number: "46", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2020-11-01T23:00:00.000+00:00", number: "47", summary: "Neue Updates von Debian aufgenommen", }, { date: "2020-11-03T23:00:00.000+00:00", number: "48", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-11-23T23:00:00.000+00:00", number: "49", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-11-24T23:00:00.000+00:00", number: "50", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-12-09T23:00:00.000+00:00", number: "51", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2020-12-21T23:00:00.000+00:00", number: "52", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-02-11T23:00:00.000+00:00", number: "53", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-04-13T22:00:00.000+00:00", number: "54", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2021-04-21T22:00:00.000+00:00", number: "55", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2021-10-10T22:00:00.000+00:00", number: "56", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2021-10-11T22:00:00.000+00:00", number: "57", summary: "Neue Updates von ORACLE aufgenommen", }, { date: "2022-01-30T23:00:00.000+00:00", number: "58", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-01-25T23:00:00.000+00:00", number: "59", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-01-26T23:00:00.000+00:00", number: "60", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "60", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, { category: "product_name", name: "Avaya Web License Manager", product: { name: "Avaya Web License Manager", product_id: "T016243", product_identification_helper: { cpe: "cpe:/a:avaya:web_license_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Open Source Linux Kernel < 5.3.11", product: { name: "Open Source Linux Kernel < 5.3.11", product_id: "6368", product_identification_helper: { cpe: "cpe:/o:linux:linux_kernel:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, { category: "product_name", name: "Oracle VM", product: { name: "Oracle VM", product_id: "T011119", product_identification_helper: { cpe: "cpe:/a:oracle:vm:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2019-19043", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19043", }, { cve: "CVE-2019-19044", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19044", }, { cve: "CVE-2019-19045", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19045", }, { cve: "CVE-2019-19046", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19046", }, { cve: "CVE-2019-19047", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19047", }, { cve: "CVE-2019-19048", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19048", }, { cve: "CVE-2019-19049", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19049", }, { cve: "CVE-2019-19050", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19050", }, { cve: "CVE-2019-19051", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19051", }, { cve: "CVE-2019-19052", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19052", }, { cve: "CVE-2019-19053", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19053", }, { cve: "CVE-2019-19054", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19054", }, { cve: "CVE-2019-19055", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19055", }, { cve: "CVE-2019-19056", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19056", }, { cve: "CVE-2019-19057", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19057", }, { cve: "CVE-2019-19058", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19058", }, { cve: "CVE-2019-19059", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19059", }, { cve: "CVE-2019-19060", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19060", }, { cve: "CVE-2019-19061", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19061", }, { cve: "CVE-2019-19062", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19062", }, { cve: "CVE-2019-19063", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19063", }, { cve: "CVE-2019-19064", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19064", }, { cve: "CVE-2019-19065", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19065", }, { cve: "CVE-2019-19066", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19066", }, { cve: "CVE-2019-19067", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19067", }, { cve: "CVE-2019-19068", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19068", }, { cve: "CVE-2019-19069", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19069", }, { cve: "CVE-2019-19070", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19070", }, { cve: "CVE-2019-19071", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19071", }, { cve: "CVE-2019-19072", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19072", }, { cve: "CVE-2019-19073", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19073", }, { cve: "CVE-2019-19074", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19074", }, { cve: "CVE-2019-19075", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19075", }, { cve: "CVE-2019-19076", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19076", }, { cve: "CVE-2019-19077", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19077", }, { cve: "CVE-2019-19078", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19078", }, { cve: "CVE-2019-19079", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19079", }, { cve: "CVE-2019-19080", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19080", }, { cve: "CVE-2019-19081", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19081", }, { cve: "CVE-2019-19082", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19082", }, { cve: "CVE-2019-19083", notes: [ { category: "description", text: "Im Linux Kernel existieren mehrere Schwachstellen. Sie befinden sich in verschiedenen Funktionen zahlreicher Treiber. Ein Angreifer kann dieses durch Übermittlung geeignet gestalteter Daten zu einem Denial of Service Angirff nutzen.", }, ], product_status: { known_affected: [ "T011119", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T004914", "T016243", "2951", "T002207", "T000126", "398363", ], }, release_date: "2019-11-17T23:00:00.000+00:00", title: "CVE-2019-19083", }, ], }
ghsa-h46p-wf26-6wcw
Vulnerability from github
A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.
{ affected: [], aliases: [ "CVE-2019-19060", ], database_specific: { cwe_ids: [ "CWE-401", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2019-11-18T06:15:00Z", severity: "HIGH", }, details: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", id: "GHSA-h46p-wf26-6wcw", modified: "2022-11-08T12:00:23Z", published: "2022-05-24T17:01:29Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-19060", }, { type: "WEB", url: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", }, { type: "WEB", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20191205-0001", }, { type: "WEB", url: "https://usn.ubuntu.com/4208-1", }, { type: "WEB", url: "https://usn.ubuntu.com/4210-1", }, { type: "WEB", url: "https://usn.ubuntu.com/4226-1", }, { type: "WEB", url: "https://usn.ubuntu.com/4364-1", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
fkie_cve-2019-19060
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "A1229D50-3DAA-4031-97C9-8FF008A36A5F", versionEndExcluding: "4.4.262", versionStartIncluding: "3.8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "D3BB1DB0-B588-4D26-89CB-F67E73EDA007", versionEndExcluding: "4.9.262", versionStartIncluding: "4.5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "33EEBE13-936B-4210-9B09-9D61A6BE9A35", versionEndExcluding: "4.14.226", versionStartIncluding: "4.10", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "2083AEA2-E04A-4A55-996D-5BB40D30417A", versionEndExcluding: "4.19.82", versionStartIncluding: "4.15", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "BC19B2E4-2B1F-44F3-9944-91396EAC744D", versionEndExcluding: "5.3.9", versionStartIncluding: "4.20", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", matchCriteriaId: "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "5C0ADE5D-F91D-4E0D-B6C5-3511B19665F1", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", matchCriteriaId: "0EF46487-B64A-454E-AECC-D74B83170ACD", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*", matchCriteriaId: "8AFF1109-26F3-43A5-A4CB-0F169FDBC0DE", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*", matchCriteriaId: "5AF71C49-ADEF-4EE2-802C-6159ADD51355", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*", matchCriteriaId: "B3BC6E59-2134-4A28-AAD2-77C8AE236BCF", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*", matchCriteriaId: "24377899-5389-4BDC-AC82-0E4186F4DE53", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*", matchCriteriaId: "23FE83DE-AE7C-4313-88E3-886110C31302", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*", matchCriteriaId: "490B327B-AC20-419B-BB76-8AB6971304BB", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*", matchCriteriaId: "8DCE2754-7A9E-4B3B-91D1-DCF90C1BABE5", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*", matchCriteriaId: "6CA74E8B-51E2-4A7C-8A98-0583D31134A6", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*", matchCriteriaId: "7B64AB37-A1D9-4163-A51B-4C780361F1F1", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*", matchCriteriaId: "7BE9C9D7-9CED-4184-A190-1024A6FB8C82", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*", matchCriteriaId: "B73D4C3C-A511-4E14-B19F-91F561ACB1B8", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*", matchCriteriaId: "0C47D72C-9B6B-4E52-AF0E-56AD58E4A930", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*", matchCriteriaId: "039C3790-5AA2-4895-AEAE-CC84A71DB907", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*", matchCriteriaId: "B4592238-D1F2-43D6-9BAB-2F63ECF9C965", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*", matchCriteriaId: "0BA78068-80E9-4E49-9056-88EAB7E3682C", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*", matchCriteriaId: "092F366C-E8B0-4BE5-B106-0B7A73B08D34", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*", matchCriteriaId: "E7992E92-B159-4810-B895-01A9B944058A", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*", matchCriteriaId: "5BDD7AAB-2BF3-4E8C-BEE2-5217E2926C11", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:fas\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "66EEA3CA-8CC7-4F0B-8204-6132D4114873", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*", matchCriteriaId: "DE7C6010-F736-4BDA-9E3B-C4370BBFA149", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*", matchCriteriaId: "DAA3919C-B2B1-4CB5-BA76-7A079AAFFC52", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", matchCriteriaId: "D6D700C5-F67F-4FFB-BE69-D524592A3D2E", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", matchCriteriaId: "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", vulnerable: true, }, { criteria: "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B2748912-FC54-47F6-8C0C-B96784765B8E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F921BC85-568E-4B69-A3CD-CF75C76672F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", matchCriteriaId: "AD7447BC-F315-4298-A822-549942FC118B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "090AA6F4-4404-4E26-82AB-C3A22636F276", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", matchCriteriaId: "815D70A8-47D3-459C-A32C-9FEACA0659D1", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", matchCriteriaId: "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", matchCriteriaId: "CD783B0C-9246-47D9-A937-6144FE8BFF0F", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", matchCriteriaId: "A31C8344-3E02-4EB8-8BD8-4C84B7959624", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", }, { lang: "es", value: "Una pérdida de memoria en la función adis_update_scan_mode_burst() en el archivo drivers/iio/imu/adis_buffer.c en el kernel de Linux versiones anteriores a la versión 5.3.9, permite a atacantes causar una denegación de servicio (consumo de memoria), también se conoce como CID-9c0530e898f3.", }, ], id: "CVE-2019-19060", lastModified: "2024-11-21T04:34:06.110", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-18T06:15:12.343", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4208-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4210-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4226-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4364-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/torvalds/linux/commit/ab612b1daf415b62c58e130cb3d0f30b255a14d0", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20191205-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4208-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4210-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4226-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4364-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-401", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.