Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-29374 (GCVE-0-2020-29374)
Vulnerability from cvelistv5
Published
2020-11-28 06:18
Modified
2024-08-04 16:48
Severity ?
EPSS score ?
Summary
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T16:48:01.979Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=2045", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20210115-0002/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { name: "DSA-5096", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2022/dsa-5096", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-10T02:06:28", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=2045", }, { tags: [ "x_refsource_MISC", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3", }, { tags: [ "x_refsource_MISC", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20210115-0002/", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { name: "DSA-5096", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2022/dsa-5096", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-29374", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugs.chromium.org/p/project-zero/issues/detail?id=2045", refsource: "MISC", url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=2045", }, { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3", refsource: "MISC", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3", }, { name: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f", refsource: "MISC", url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f", }, { name: "https://security.netapp.com/advisory/ntap-20210115-0002/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20210115-0002/", }, { name: "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { name: "DSA-5096", refsource: "DEBIAN", url: "https://www.debian.org/security/2022/dsa-5096", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-29374", datePublished: "2020-11-28T06:18:56", dateReserved: "2020-11-28T00:00:00", dateUpdated: "2024-08-04T16:48:01.979Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"5.7.3\", \"matchCriteriaId\": \"9D2A5683-E016-4DD2-9AB1-D538551B122F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECF32BB1-9A58-4821-AE49-5D5C8200631F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F21DE67F-CDFD-4D36-9967-633CD0240C6F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1236B66D-EB11-4324-929F-E2B86683C3C7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"281DFC67-46BB-4FC2-BE03-3C65C9311F65\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:solidfire_\\\\&_hci_management_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6D700C5-F67F-4FFB-BE69-D524592A3D2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:solidfire_\\\\&_hci_storage_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D452B464-1200-4B72-9A89-42DC58486191\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C61DF9A-ABDE-44A2-A060-B088428D5064\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.\"}, {\"lang\": \"es\", \"value\": \"Se detect\\u00f3 un problema en el kernel de Linux versiones anteriores a 5.7.3, relacionado con los archivos mm/gup.c y mm/huge_memory.c. La implementaci\\u00f3n de la funci\\u00f3n get_user_pages (tambi\\u00e9n se conoce como gup), cuando se usa para una p\\u00e1gina copy-on-write, no considera apropiadamente la sem\\u00e1ntica de las operaciones de lectura y, por lo tanto, puede otorgar acceso de escritura involuntario, tambi\\u00e9n se conoce como CID-17839856fd58\"}]", id: "CVE-2020-29374", lastModified: "2024-11-21T05:23:56.503", metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N\", \"baseScore\": 3.6, \"baseSeverity\": \"LOW\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.0, \"impactScore\": 2.5}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:P/I:P/A:N\", \"baseScore\": 3.3, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.4, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2020-11-28T07:15:11.960", references: "[{\"url\": \"http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugs.chromium.org/p/project-zero/issues/detail?id=2045\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\", \"Third Party Advisory\", \"Vendor Advisory\"]}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210115-0002/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2022/dsa-5096\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugs.chromium.org/p/project-zero/issues/detail?id=2045\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\", \"Vendor Advisory\"]}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210115-0002/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2022/dsa-5096\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-362\"}, {\"lang\": \"en\", \"value\": \"CWE-863\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2020-29374\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-11-28T07:15:11.960\",\"lastModified\":\"2024-11-21T05:23:56.503\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.\"},{\"lang\":\"es\",\"value\":\"Se detectó un problema en el kernel de Linux versiones anteriores a 5.7.3, relacionado con los archivos mm/gup.c y mm/huge_memory.c. La implementación de la función get_user_pages (también se conoce como gup), cuando se usa para una página copy-on-write, no considera apropiadamente la semántica de las operaciones de lectura y, por lo tanto, puede otorgar acceso de escritura involuntario, también se conoce como CID-17839856fd58\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":3.6,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.0,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":3.3,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"},{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.7.3\",\"matchCriteriaId\":\"9D2A5683-E016-4DD2-9AB1-D538551B122F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECF32BB1-9A58-4821-AE49-5D5C8200631F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F21DE67F-CDFD-4D36-9967-633CD0240C6F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1236B66D-EB11-4324-929F-E2B86683C3C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"281DFC67-46BB-4FC2-BE03-3C65C9311F65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire_\\\\&_hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D700C5-F67F-4FFB-BE69-D524592A3D2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire_\\\\&_hci_storage_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D452B464-1200-4B72-9A89-42DC58486191\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C61DF9A-ABDE-44A2-A060-B088428D5064\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=2045\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210115-0002/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5096\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=2045\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210115-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5096\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
suse-su-2021:1210-1
Vulnerability from csaf_suse
Published
2021-04-15 13:29
Modified
2021-04-15 13:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access (bsc#1179660, bsc#1179428).
- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2020-0433: Fixed a use after free due to improper locking which could have led to local escalation of privilege (bsc#1176720).
- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).
- CVE-2021-20219: Fixed a denial of service in n_tty_receive_char_special (bsc#1184397).
- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).
The following non-security bugs were fixed:
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- bfq: Fix kABI for update internal depth state when queue depth changes (bsc#1172455).
- bfq: update internal depth state when queue depth changes (bsc#1172455).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf: fix subprog verifier bypass by div/mod by 0 exception (bsc#1184170).
- bpf: fix x64 JIT code generation for jmp to 1st insn (bsc#1178163).
- bpf_lru_list: Read double-checked variable once without lock (git-fixes).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check all path components in resolved dfs target (bsc#1179755).
- cifs_debug: use %pd instead of messing with ->d_name (bsc#1181507).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: fix nodfs mount option (bsc#1179755).
- cifs: introduce helper for finding referral server (bsc#1179755).
- cifs: New optype for session operations (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (bsc#1104270).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if (bsc#1129770)
- drm/atomic: Create __drm_atomic_helper_crtc_reset() for subclassing (bsc#1142635)
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1129770)
- drm/compat: Clear bounce structures (bsc#1129770)
- drm/etnaviv: replace MMU flush marker with flush sequence (bsc#1154048)
- drm/gma500: Fix error return code in psb_driver_load() (bsc#1129770)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152446)
- drm/mediatek: Fix aal size config (bsc#1129770)
- drm: meson_drv add shutdown function (git-fixes).
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (bsc#1129770)
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm: mxsfb: check framebuffer pitch (bsc#1129770)
- drm/omap: fix max fclk divider for omap36xx (bsc#1152446)
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1129770)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1129770)
- drm/radeon: fix AGP dependency (git-fixes).
- drm: rcar-du: Put reference to VSP device (bsc#1129770)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1129770)
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1129770)
- ethernet: alx: fix order of calls on resume (git-fixes).
- fbdev: aty: SPARC64 requires FB_ATY_CT (bsc#1129770)
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- fix setting irq affinity (bsc#1184583)
- futex: Prevent robust futex exit race (git-fixes).
- gma500: clean up error handling in init (bsc#1129770)
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i40e: Add zero-initialization of AQ command structures (bsc#1109837 bsc#1111981).
- i40e: Fix add TC filter for IPv6 (bsc#1109837 bsc#1111981 ).
- i40e: Fix endianness conversions (bsc#1109837 bsc#1111981 ).
- IB/mlx5: Return appropriate error code instead of ENOMEM (bsc#1103991).
- ibmvnic: add comments for spinlock_t definitions (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).
- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
- ibmvnic: avoid multiple line dereference (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Do not replenish RX buffers after every polling loop (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: fix block comments (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (bsc#1184114 ltc#192237).
- ibmvnic: Fix TX completion error handling (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: prefer strscpy over strlcpy (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: reduce wait for completion time (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: remove excessive irqsave (bsc#1065729).
- ibmvnic: remove never executed if statement (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: send_login should check for crq errors (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: simplify reset_long_term_buff function (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).
- ibmvnic: track pending login (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).
- ice: Account for port VLAN in VF max packet size calculation (bsc#1118661).
- igc: check return value of ret_val in igc_config_fc_after_link_up (bsc#1118657).
- igc: Report speed and duplex as unknown when device is runtime suspended (jsc#SLE-4799).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (bsc#1118657).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: raydium_ts_i2c - do not send zero length (git-fixes).
- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183378).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183379).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183380).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183381).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (bsc#1113994).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kabi/severities: Add rtas_online_cpus_mask, rtas_offline_cpus_mask
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183382).
- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE.
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- net: bridge: use switchdev for port flags set through sysfs too (bsc#1112374).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: core: introduce __netdev_notify_peers (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- net: hns3: add a check for index in hclge_get_rss_key() (bsc#1126390).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (bsc#1104353).
- net: hns3: fix bug when calculating the TCAM table info (bsc#1104353).
- net: hns3: fix query vlan mask value error for flow director (bsc#1104353).
- net/mlx5e: Update max_opened_tc also when channels are closed (bsc#1103990).
- net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8081 (bsc#1119113).
- net: re-solve some conflicts after net -> net-next merge (bsc#1184114 ltc#192237 bsc#1176855 ltc#187293).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Align checking of syscall user config accessors (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc: Convert to using %pOFn instead of device_node.name (bsc#1181674 ltc#189159).
- powerpc: Fix some spelling mistakes (bsc#1181674 ltc#189159).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/numa: Suppress 'VPHN is not supported' messages (bsc#1181674 ltc#189159).
- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- powerpc/pseries: Add empty update_numa_cpu_lookup_table() for NUMA=n (bsc#1181674 ltc#189159).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries: Generalize hcall_vphn() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- powerpc/rtas: Unexport rtas_online_cpus_mask, rtas_offline_cpus_mask (bsc#1181674 ltc#189159).
- powerpc/vio: Use device_type to detect family (bsc#1181674 ltc#189159).
- printk: fix deadlock when kernel panic (bsc#1183018).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- random: fix the RNDRESEEDCRNG ioctl (git-fixes).
- rcu: Allow only one expedited GP to run concurrently with (git-fixes)
- rcu: Fix missed wakeup of exp_wq waiters (git-fixes)
- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (bsc#1103991).
- RDMA/rxe: Remove useless code in rxe_recv.c (bsc#1103992 ).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- RDMA/uverbs: Fix kernel-doc warning of _uverbs_alloc (bsc#1103992).
- Revert 'ibmvnic: remove never executed if statement' (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).
- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).
- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).
- s390/pci: Fix s390_mmio_read/write with MIO (LTC#192079 bsc#1183755).
- s390/vtime: fix increased steal time accounting (bsc#1183861).
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/vtime: Fix guest/system mis-accounting on task switch (git-fixes)
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix ancient double free (bsc#1182574).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1182574).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix kerneldoc inconsistency in lpfc_sli4_dump_page_a0() (bsc#1182574).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix 'physical' typos (bsc#1182574).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- selinux: never allow relabeling on context mounts (git-fixes).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).
- usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- usbip: fix stub_dev to check for stream socket (git-fixes).
- usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- usbip: Fix unsafe unaligned pointer usage (git-fixes).
- usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- usbip: fix vhci_hcd to check for stream socket (git-fixes).
- usbip: tools: fix build error for multiple definition (git-fixes).
- usb: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- usb: replace hardcode maximum usb string length by definition (git-fixes).
- usb: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- usb: serial: option: add Quectel EM160R-GL (git-fixes).
- usb-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- use __netdev_notify_peers in ibmvnic (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1129770)
- video: fbdev: atmel_lcdfb: fix return error code in (bsc#1129770) Backporting notes: * context changes * fallout from trailing whitespaces
- vsprintf: Do not have bprintf dereference pointers (bsc#1184494).
- vsprintf: Do not preprocess non-dereferenced pointers for bprintf (%px and %pK) (bsc#1184494).
- vsprintf: Fix off-by-one bug in bstr_printf() processing dereferenced pointers (bsc#1184494).
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- x86/ioapic: Ignore IRQ2 again (12sp5).
- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (12sp5).
- xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).
- xsk: Remove dangling function declaration from header file (bsc#1109837).
Patchnames
SUSE-2021-1210,SUSE-SLE-HA-12-SP5-2021-1210,SUSE-SLE-Live-Patching-12-SP5-2021-1210,SUSE-SLE-SDK-12-SP5-2021-1210,SUSE-SLE-SERVER-12-SP5-2021-1210,SUSE-SLE-WE-12-SP5-2021-1210
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).\n- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).\n- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).\n- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).\n- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).\n- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).\n- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).\n- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).\n- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).\n- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).\n- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).\n- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).\n- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).\n- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).\n- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).\n- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).\n- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).\n- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access (bsc#1179660, bsc#1179428). \n- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).\n- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).\n- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).\n- CVE-2020-0433: Fixed a use after free due to improper locking which could have led to local escalation of privilege (bsc#1176720).\n- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).\n- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).\n- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).\n- CVE-2021-20219: Fixed a denial of service in n_tty_receive_char_special (bsc#1184397).\n- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).\n- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).\n\nThe following non-security bugs were fixed:\n\n- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).\n- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).\n- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).\n- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).\n- amba: Fix resource leak for drivers without .remove (git-fixes).\n- bfq: Fix kABI for update internal depth state when queue depth changes (bsc#1172455).\n- bfq: update internal depth state when queue depth changes (bsc#1172455).\n- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).\n- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).\n- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).\n- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).\n- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).\n- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).\n- bpf: fix subprog verifier bypass by div/mod by 0 exception (bsc#1184170).\n- bpf: fix x64 JIT code generation for jmp to 1st insn (bsc#1178163).\n- bpf_lru_list: Read double-checked variable once without lock (git-fixes).\n- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).\n- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).\n- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).\n- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).\n- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).\n- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).\n- can: peak_usb: add forgotten supported devices (git-fixes).\n- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).\n- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).\n- cifs: change noisy error message to FYI (bsc#1181507).\n- cifs: check all path components in resolved dfs target (bsc#1179755).\n- cifs_debug: use %pd instead of messing with ->d_name (bsc#1181507).\n- cifs: do not send close in compound create+close requests (bsc#1181507).\n- cifs: fix nodfs mount option (bsc#1179755).\n- cifs: introduce helper for finding referral server (bsc#1179755).\n- cifs: New optype for session operations (bsc#1181507).\n- cifs: print MIDs in decimal notation (bsc#1181507).\n- cifs: return proper error code in statfs(2) (bsc#1181507).\n- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (bsc#1104270).\n- dmaengine: hsu: disable spurious interrupt (git-fixes).\n- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if (bsc#1129770) \n- drm/atomic: Create __drm_atomic_helper_crtc_reset() for subclassing (bsc#1142635) \n- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1129770) \n- drm/compat: Clear bounce structures (bsc#1129770) \n- drm/etnaviv: replace MMU flush marker with flush sequence (bsc#1154048)\n- drm/gma500: Fix error return code in psb_driver_load() (bsc#1129770)\n- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152446) \n- drm/mediatek: Fix aal size config (bsc#1129770) \n- drm: meson_drv add shutdown function (git-fixes).\n- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).\n- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (bsc#1129770)\n- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).\n- drm: mxsfb: check framebuffer pitch (bsc#1129770) \n- drm/omap: fix max fclk divider for omap36xx (bsc#1152446)\n- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1129770)\n- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1129770) \n- drm/radeon: fix AGP dependency (git-fixes).\n- drm: rcar-du: Put reference to VSP device (bsc#1129770) \n- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1129770) \n- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1129770)\n- ethernet: alx: fix order of calls on resume (git-fixes).\n- fbdev: aty: SPARC64 requires FB_ATY_CT (bsc#1129770)\n- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).\n- fix setting irq affinity (bsc#1184583)\n- futex: Prevent robust futex exit race (git-fixes).\n- gma500: clean up error handling in init (bsc#1129770)\n- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).\n- HID: make arrays usage and value to be the same (git-fixes).\n- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).\n- i40e: Add zero-initialization of AQ command structures (bsc#1109837 bsc#1111981).\n- i40e: Fix add TC filter for IPv6 (bsc#1109837 bsc#1111981 ).\n- i40e: Fix endianness conversions (bsc#1109837 bsc#1111981 ).\n- IB/mlx5: Return appropriate error code instead of ENOMEM (bsc#1103991).\n- ibmvnic: add comments for spinlock_t definitions (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: add memory barrier to protect long term buffer (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).\n- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).\n- ibmvnic: avoid multiple line dereference (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: create send_control_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: create send_query_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Do not replenish RX buffers after every polling loop (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).\n- ibmvnic: Ensure that device queue memory is cache-line aligned (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: fix block comments (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: fix braces (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: fix miscellaneous checks (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (bsc#1184114 ltc#192237).\n- ibmvnic: Fix TX completion error handling (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Fix use-after-free of VNIC login response buffer (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: handle inconsistent login with reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Harden device Command Response Queue handshake (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: merge do_change_param_reset into do_reset (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: no reset timeout for 5 seconds after reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: prefer strscpy over strlcpy (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: reduce wait for completion time (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: remove excessive irqsave (bsc#1065729).\n- ibmvnic: remove never executed if statement (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_cap_queries to send_query_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_map_query to send_query_map (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: send_login should check for crq errors (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: simplify reset_long_term_buff function (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).\n- ibmvnic: skip send_request_unmap for timeout reset (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).\n- ibmvnic: skip tx timeout reset while in resetting (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: stop free_all_rwi on failed reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).\n- ibmvnic: track pending login (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).\n- ice: Account for port VLAN in VF max packet size calculation (bsc#1118661).\n- igc: check return value of ret_val in igc_config_fc_after_link_up (bsc#1118657).\n- igc: Report speed and duplex as unknown when device is runtime suspended (jsc#SLE-4799).\n- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (bsc#1118657).\n- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).\n- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).\n- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).\n- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).\n- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).\n- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).\n- Input: i8042 - unbreak Pegatron C15B (git-fixes).\n- Input: raydium_ts_i2c - do not send zero length (git-fixes).\n- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).\n- Input: xpad - sync supported devices with fork on GitHub (git-fixes).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183378).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183379).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183380).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183381).\n- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (bsc#1113994).\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kabi/severities: Add rtas_online_cpus_mask, rtas_offline_cpus_mask\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: add more data to CSD lock debugging (bsc#1180846).\n- kernel/smp: prepare more CSD lock debugging (bsc#1180846).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183382).\n- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).\n- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).\n- mac80211: fix double free in ibss_leave (git-fixes).\n- mac80211: fix rate mask reset (git-fixes).\n- media: usbtv: Fix deadlock on suspend (git-fixes).\n- media: uvcvideo: Allow entities with no pads (git-fixes).\n- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).\n- mmc: core: Fix partition switch time for eMMC (git-fixes).\n- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE.\n- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).\n- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).\n- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).\n- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).\n- net: bridge: use switchdev for port flags set through sysfs too (bsc#1112374).\n- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).\n- net: core: introduce __netdev_notify_peers (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- net: hns3: add a check for index in hclge_get_rss_key() (bsc#1126390).\n- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (bsc#1104353).\n- net: hns3: fix bug when calculating the TCAM table info (bsc#1104353).\n- net: hns3: fix query vlan mask value error for flow director (bsc#1104353).\n- net/mlx5e: Update max_opened_tc also when channels are closed (bsc#1103990).\n- net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8081 (bsc#1119113).\n- net: re-solve some conflicts after net -> net-next merge (bsc#1184114 ltc#192237 bsc#1176855 ltc#187293).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).\n- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).\n- PCI: Align checking of syscall user config accessors (git-fixes).\n- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).\n- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).\n- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).\n- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).\n- powerpc: Convert to using %pOFn instead of device_node.name (bsc#1181674 ltc#189159).\n- powerpc: Fix some spelling mistakes (bsc#1181674 ltc#189159).\n- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).\n- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).\n- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).\n- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).\n- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).\n- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).\n- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).\n- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).\n- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).\n- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).\n- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).\n- powerpc/numa: Suppress 'VPHN is not supported' messages (bsc#1181674 ltc#189159).\n- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- powerpc/pseries: Add empty update_numa_cpu_lookup_table() for NUMA=n (bsc#1181674 ltc#189159).\n- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).\n- powerpc/pseries: Generalize hcall_vphn() (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).\n- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).\n- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).\n- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).\n- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).\n- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).\n- powerpc/rtas: Unexport rtas_online_cpus_mask, rtas_offline_cpus_mask (bsc#1181674 ltc#189159).\n- powerpc/vio: Use device_type to detect family (bsc#1181674 ltc#189159).\n- printk: fix deadlock when kernel panic (bsc#1183018).\n- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).\n- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).\n- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).\n- qxl: Fix uninitialised struct field head.surface_id (git-fixes).\n- random: fix the RNDRESEEDCRNG ioctl (git-fixes).\n- rcu: Allow only one expedited GP to run concurrently with (git-fixes)\n- rcu: Fix missed wakeup of exp_wq waiters (git-fixes)\n- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (bsc#1103991).\n- RDMA/rxe: Remove useless code in rxe_recv.c (bsc#1103992 ).\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/uverbs: Fix kernel-doc warning of _uverbs_alloc (bsc#1103992).\n- Revert 'ibmvnic: remove never executed if statement' (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).\n- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).\n- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).\n- s390/pci: Fix s390_mmio_read/write with MIO (LTC#192079 bsc#1183755).\n- s390/vtime: fix increased steal time accounting (bsc#1183861).\n- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)\n- sched/vtime: Fix guest/system mis-accounting on task switch (git-fixes)\n- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).\n- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).\n- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).\n- scsi: lpfc: Fix ancient double free (bsc#1182574).\n- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).\n- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).\n- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1182574).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).\n- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).\n- scsi: lpfc: Fix kerneldoc inconsistency in lpfc_sli4_dump_page_a0() (bsc#1182574).\n- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).\n- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).\n- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).\n- scsi: lpfc: Fix 'physical' typos (bsc#1182574).\n- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).\n- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).\n- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).\n- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).\n- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).\n- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).\n- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).\n- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).\n- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).\n- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).\n- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).\n- selinux: never allow relabeling on context mounts (git-fixes).\n- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).\n- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).\n- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).\n- Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).\n- usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).\n- usbip: fix stub_dev to check for stream socket (git-fixes).\n- usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).\n- usbip: Fix unsafe unaligned pointer usage (git-fixes).\n- usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd to check for stream socket (git-fixes).\n- usbip: tools: fix build error for multiple definition (git-fixes).\n- usb: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).\n- usb: replace hardcode maximum usb string length by definition (git-fixes).\n- usb: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).\n- usb: serial: option: add Quectel EM160R-GL (git-fixes).\n- usb-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).\n- use __netdev_notify_peers in ibmvnic (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- video: fbdev: acornfb: remove free_unused_pages() (bsc#1129770)\n- video: fbdev: atmel_lcdfb: fix return error code in (bsc#1129770) Backporting notes: \t* context changes \t* fallout from trailing whitespaces\n- vsprintf: Do not have bprintf dereference pointers (bsc#1184494).\n- vsprintf: Do not preprocess non-dereferenced pointers for bprintf (%px and %pK) (bsc#1184494).\n- vsprintf: Fix off-by-one bug in bstr_printf() processing dereferenced pointers (bsc#1184494).\n- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).\n- x86/ioapic: Ignore IRQ2 again (12sp5).\n- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (12sp5).\n- xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).\n- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).\n- xsk: Remove dangling function declaration from header file (bsc#1109837).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-1210,SUSE-SLE-HA-12-SP5-2021-1210,SUSE-SLE-Live-Patching-12-SP5-2021-1210,SUSE-SLE-SDK-12-SP5-2021-1210,SUSE-SLE-SERVER-12-SP5-2021-1210,SUSE-SLE-WE-12-SP5-2021-1210", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1210-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:1210-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20211210-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:1210-1", url: "https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103991", url: "https://bugzilla.suse.com/1103991", }, { category: "self", summary: "SUSE Bug 1103992", url: "https://bugzilla.suse.com/1103992", }, { category: "self", summary: "SUSE Bug 1104270", url: "https://bugzilla.suse.com/1104270", }, { category: "self", summary: "SUSE Bug 1104353", url: "https://bugzilla.suse.com/1104353", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1111981", url: "https://bugzilla.suse.com/1111981", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1113295", url: "https://bugzilla.suse.com/1113295", }, { category: "self", summary: "SUSE Bug 1113994", url: "https://bugzilla.suse.com/1113994", }, { category: "self", summary: "SUSE Bug 1118657", url: "https://bugzilla.suse.com/1118657", }, { category: "self", summary: "SUSE Bug 1118661", url: "https://bugzilla.suse.com/1118661", }, { category: "self", summary: "SUSE Bug 1119113", url: "https://bugzilla.suse.com/1119113", }, { category: "self", summary: "SUSE Bug 1126390", url: "https://bugzilla.suse.com/1126390", }, { category: "self", summary: "SUSE Bug 1129770", url: "https://bugzilla.suse.com/1129770", }, { category: "self", summary: "SUSE Bug 1132477", url: "https://bugzilla.suse.com/1132477", }, { category: "self", summary: "SUSE Bug 1142635", url: "https://bugzilla.suse.com/1142635", }, { category: "self", summary: "SUSE Bug 1152446", url: "https://bugzilla.suse.com/1152446", }, { category: "self", summary: "SUSE Bug 1154048", url: "https://bugzilla.suse.com/1154048", }, { category: "self", summary: "SUSE Bug 1169709", url: "https://bugzilla.suse.com/1169709", }, { category: "self", summary: "SUSE Bug 1172455", url: "https://bugzilla.suse.com/1172455", }, { category: "self", summary: "SUSE Bug 1173485", url: "https://bugzilla.suse.com/1173485", }, { category: "self", summary: "SUSE Bug 1175165", url: "https://bugzilla.suse.com/1175165", }, { category: "self", summary: "SUSE Bug 1176720", url: "https://bugzilla.suse.com/1176720", }, { category: "self", summary: "SUSE Bug 1176855", url: "https://bugzilla.suse.com/1176855", }, { category: "self", summary: "SUSE Bug 1178163", url: "https://bugzilla.suse.com/1178163", }, { category: "self", summary: "SUSE Bug 1178181", url: "https://bugzilla.suse.com/1178181", }, { category: "self", summary: "SUSE Bug 1179243", url: "https://bugzilla.suse.com/1179243", }, { category: "self", summary: "SUSE Bug 1179428", url: "https://bugzilla.suse.com/1179428", }, { category: "self", summary: "SUSE Bug 1179454", url: "https://bugzilla.suse.com/1179454", }, { category: "self", summary: "SUSE Bug 1179660", url: "https://bugzilla.suse.com/1179660", }, { category: "self", summary: "SUSE Bug 1179755", url: "https://bugzilla.suse.com/1179755", }, { category: "self", summary: "SUSE Bug 1180846", url: "https://bugzilla.suse.com/1180846", }, { category: "self", summary: "SUSE Bug 1181507", url: "https://bugzilla.suse.com/1181507", }, { category: "self", summary: "SUSE Bug 1181515", url: "https://bugzilla.suse.com/1181515", }, { category: "self", summary: "SUSE Bug 1181544", url: "https://bugzilla.suse.com/1181544", }, { category: "self", summary: "SUSE Bug 1181655", url: "https://bugzilla.suse.com/1181655", }, { category: "self", summary: "SUSE Bug 1181674", url: "https://bugzilla.suse.com/1181674", }, { category: "self", summary: "SUSE Bug 1181747", url: "https://bugzilla.suse.com/1181747", }, { category: "self", summary: "SUSE Bug 1181753", url: "https://bugzilla.suse.com/1181753", }, { category: "self", summary: "SUSE Bug 1181843", url: "https://bugzilla.suse.com/1181843", }, { category: "self", summary: "SUSE Bug 1182011", url: "https://bugzilla.suse.com/1182011", }, { category: "self", summary: "SUSE Bug 1182175", url: "https://bugzilla.suse.com/1182175", }, { category: "self", summary: "SUSE Bug 1182485", url: "https://bugzilla.suse.com/1182485", }, { category: "self", summary: "SUSE Bug 1182574", url: "https://bugzilla.suse.com/1182574", }, { category: "self", summary: "SUSE Bug 1182715", url: "https://bugzilla.suse.com/1182715", }, { category: "self", summary: "SUSE Bug 1182716", url: "https://bugzilla.suse.com/1182716", }, { category: "self", summary: "SUSE Bug 1182717", url: "https://bugzilla.suse.com/1182717", }, { category: "self", summary: "SUSE Bug 1183018", url: "https://bugzilla.suse.com/1183018", }, { category: "self", summary: "SUSE Bug 1183022", url: "https://bugzilla.suse.com/1183022", }, { category: "self", summary: "SUSE Bug 1183023", url: "https://bugzilla.suse.com/1183023", }, { category: "self", summary: "SUSE Bug 1183378", url: "https://bugzilla.suse.com/1183378", }, { category: "self", summary: "SUSE Bug 1183379", url: "https://bugzilla.suse.com/1183379", }, { category: "self", summary: "SUSE Bug 1183380", url: "https://bugzilla.suse.com/1183380", }, { category: "self", summary: "SUSE Bug 1183381", url: "https://bugzilla.suse.com/1183381", }, { category: "self", summary: "SUSE Bug 1183382", url: "https://bugzilla.suse.com/1183382", }, { category: "self", summary: "SUSE Bug 1183405", url: "https://bugzilla.suse.com/1183405", }, { category: "self", summary: "SUSE Bug 1183416", url: "https://bugzilla.suse.com/1183416", }, { category: "self", summary: "SUSE Bug 1183509", url: "https://bugzilla.suse.com/1183509", }, { category: "self", summary: "SUSE Bug 1183593", url: "https://bugzilla.suse.com/1183593", }, { category: "self", summary: "SUSE Bug 1183646", url: "https://bugzilla.suse.com/1183646", }, { category: "self", summary: "SUSE Bug 1183662", url: "https://bugzilla.suse.com/1183662", }, { category: "self", summary: "SUSE Bug 1183686", url: "https://bugzilla.suse.com/1183686", }, { category: "self", summary: "SUSE Bug 1183692", url: "https://bugzilla.suse.com/1183692", }, { category: "self", summary: "SUSE Bug 1183696", url: "https://bugzilla.suse.com/1183696", }, { category: "self", summary: "SUSE Bug 1183755", url: "https://bugzilla.suse.com/1183755", }, { category: "self", summary: "SUSE Bug 1183775", url: "https://bugzilla.suse.com/1183775", }, { category: "self", summary: "SUSE Bug 1183861", url: "https://bugzilla.suse.com/1183861", }, { category: "self", summary: "SUSE Bug 1183871", url: "https://bugzilla.suse.com/1183871", }, { category: "self", summary: "SUSE Bug 1184114", url: "https://bugzilla.suse.com/1184114", }, { category: "self", summary: "SUSE Bug 1184120", url: "https://bugzilla.suse.com/1184120", }, { category: "self", summary: "SUSE Bug 1184167", url: "https://bugzilla.suse.com/1184167", }, { category: "self", summary: "SUSE Bug 1184168", url: "https://bugzilla.suse.com/1184168", }, { category: "self", summary: "SUSE Bug 1184170", url: "https://bugzilla.suse.com/1184170", }, { category: "self", summary: "SUSE Bug 1184192", url: "https://bugzilla.suse.com/1184192", }, { category: "self", summary: "SUSE Bug 1184193", url: "https://bugzilla.suse.com/1184193", }, { category: "self", summary: "SUSE Bug 1184196", url: "https://bugzilla.suse.com/1184196", }, { category: "self", summary: "SUSE Bug 1184198", url: "https://bugzilla.suse.com/1184198", }, { category: "self", summary: "SUSE Bug 1184391", url: "https://bugzilla.suse.com/1184391", }, { category: "self", summary: "SUSE Bug 1184393", url: "https://bugzilla.suse.com/1184393", }, { category: "self", summary: "SUSE Bug 1184397", url: "https://bugzilla.suse.com/1184397", }, { category: "self", summary: "SUSE Bug 1184494", url: "https://bugzilla.suse.com/1184494", }, { category: "self", summary: "SUSE Bug 1184511", url: "https://bugzilla.suse.com/1184511", }, { category: "self", summary: "SUSE Bug 1184583", url: "https://bugzilla.suse.com/1184583", }, { category: "self", summary: "SUSE CVE CVE-2020-0433 page", url: "https://www.suse.com/security/cve/CVE-2020-0433/", }, { category: "self", summary: "SUSE CVE CVE-2020-25670 page", url: "https://www.suse.com/security/cve/CVE-2020-25670/", }, { category: "self", summary: "SUSE CVE CVE-2020-25671 page", url: "https://www.suse.com/security/cve/CVE-2020-25671/", }, { category: "self", summary: "SUSE CVE CVE-2020-25672 page", url: "https://www.suse.com/security/cve/CVE-2020-25672/", }, { category: "self", summary: "SUSE CVE CVE-2020-25673 page", url: "https://www.suse.com/security/cve/CVE-2020-25673/", }, { category: "self", summary: "SUSE CVE CVE-2020-27170 page", url: "https://www.suse.com/security/cve/CVE-2020-27170/", }, { category: "self", summary: "SUSE CVE CVE-2020-27171 page", url: "https://www.suse.com/security/cve/CVE-2020-27171/", }, { category: "self", summary: "SUSE CVE CVE-2020-27815 page", url: "https://www.suse.com/security/cve/CVE-2020-27815/", }, { category: "self", summary: "SUSE CVE CVE-2020-29368 page", url: "https://www.suse.com/security/cve/CVE-2020-29368/", }, { category: "self", summary: "SUSE CVE CVE-2020-29374 page", url: "https://www.suse.com/security/cve/CVE-2020-29374/", }, { category: "self", summary: "SUSE CVE CVE-2020-35519 page", url: "https://www.suse.com/security/cve/CVE-2020-35519/", }, { category: "self", summary: "SUSE CVE CVE-2020-36311 page", url: "https://www.suse.com/security/cve/CVE-2020-36311/", }, { category: "self", summary: "SUSE CVE CVE-2021-20219 page", url: "https://www.suse.com/security/cve/CVE-2021-20219/", }, { category: "self", summary: "SUSE CVE CVE-2021-26930 page", url: "https://www.suse.com/security/cve/CVE-2021-26930/", }, { category: "self", summary: "SUSE CVE CVE-2021-26931 page", url: "https://www.suse.com/security/cve/CVE-2021-26931/", }, { category: "self", summary: "SUSE CVE CVE-2021-26932 page", url: "https://www.suse.com/security/cve/CVE-2021-26932/", }, { category: "self", summary: "SUSE CVE CVE-2021-27363 page", url: "https://www.suse.com/security/cve/CVE-2021-27363/", }, { category: "self", summary: "SUSE CVE CVE-2021-27364 page", url: "https://www.suse.com/security/cve/CVE-2021-27364/", }, { category: "self", summary: "SUSE CVE CVE-2021-27365 page", url: "https://www.suse.com/security/cve/CVE-2021-27365/", }, { category: "self", summary: "SUSE CVE CVE-2021-28038 page", url: "https://www.suse.com/security/cve/CVE-2021-28038/", }, { category: "self", summary: "SUSE CVE CVE-2021-28660 page", url: "https://www.suse.com/security/cve/CVE-2021-28660/", }, { category: "self", summary: "SUSE CVE CVE-2021-28688 page", url: "https://www.suse.com/security/cve/CVE-2021-28688/", }, { category: "self", summary: "SUSE CVE CVE-2021-28964 page", url: "https://www.suse.com/security/cve/CVE-2021-28964/", }, { category: "self", summary: "SUSE CVE CVE-2021-28971 page", url: "https://www.suse.com/security/cve/CVE-2021-28971/", }, { category: "self", summary: "SUSE CVE CVE-2021-28972 page", url: "https://www.suse.com/security/cve/CVE-2021-28972/", }, { category: "self", summary: "SUSE CVE CVE-2021-29154 page", url: "https://www.suse.com/security/cve/CVE-2021-29154/", }, { category: "self", summary: "SUSE CVE CVE-2021-29264 page", url: "https://www.suse.com/security/cve/CVE-2021-29264/", }, { category: "self", summary: "SUSE CVE CVE-2021-29265 page", url: "https://www.suse.com/security/cve/CVE-2021-29265/", }, { category: "self", summary: "SUSE CVE CVE-2021-29647 page", url: "https://www.suse.com/security/cve/CVE-2021-29647/", }, { category: "self", summary: "SUSE CVE CVE-2021-30002 page", url: "https://www.suse.com/security/cve/CVE-2021-30002/", }, { category: "self", summary: "SUSE CVE CVE-2021-3428 page", url: "https://www.suse.com/security/cve/CVE-2021-3428/", }, { category: "self", summary: "SUSE CVE CVE-2021-3444 page", url: "https://www.suse.com/security/cve/CVE-2021-3444/", }, { category: "self", summary: "SUSE CVE CVE-2021-3483 page", url: "https://www.suse.com/security/cve/CVE-2021-3483/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-04-15T13:29:28Z", generator: { date: "2021-04-15T13:29:28Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:1210-1", initial_release_date: "2021-04-15T13:29:28Z", revision_history: [ { date: "2021-04-15T13:29:28Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.66.2.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-122.66.2.aarch64", product_id: "cluster-md-kmp-default-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.66.2.aarch64", product: { name: "dlm-kmp-default-4.12.14-122.66.2.aarch64", product_id: "dlm-kmp-default-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.66.2.aarch64", product: { name: "gfs2-kmp-default-4.12.14-122.66.2.aarch64", product_id: "gfs2-kmp-default-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.66.2.aarch64", product: { name: "kernel-default-4.12.14-122.66.2.aarch64", product_id: "kernel-default-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.66.2.aarch64", product: { name: "kernel-default-base-4.12.14-122.66.2.aarch64", product_id: "kernel-default-base-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.66.2.aarch64", product: { name: "kernel-default-devel-4.12.14-122.66.2.aarch64", product_id: "kernel-default-devel-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.66.2.aarch64", product: { name: "kernel-default-extra-4.12.14-122.66.2.aarch64", product_id: "kernel-default-extra-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.66.2.aarch64", product: { name: "kernel-default-kgraft-4.12.14-122.66.2.aarch64", product_id: "kernel-default-kgraft-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.66.2.aarch64", product: { name: "kernel-default-kgraft-devel-4.12.14-122.66.2.aarch64", product_id: "kernel-default-kgraft-devel-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.66.2.aarch64", product: { name: "kernel-obs-build-4.12.14-122.66.2.aarch64", product_id: "kernel-obs-build-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.66.2.aarch64", product: { name: "kernel-obs-qa-4.12.14-122.66.2.aarch64", product_id: "kernel-obs-qa-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.66.2.aarch64", product: { name: "kernel-syms-4.12.14-122.66.2.aarch64", product_id: "kernel-syms-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.66.2.aarch64", product: { name: "kernel-vanilla-4.12.14-122.66.2.aarch64", product_id: "kernel-vanilla-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.66.2.aarch64", product: { name: "kernel-vanilla-base-4.12.14-122.66.2.aarch64", product_id: "kernel-vanilla-base-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.66.2.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-122.66.2.aarch64", product_id: "kernel-vanilla-devel-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.66.2.aarch64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.66.2.aarch64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.66.2.aarch64", product: { name: "kselftests-kmp-default-4.12.14-122.66.2.aarch64", product_id: "kselftests-kmp-default-4.12.14-122.66.2.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.66.2.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-122.66.2.aarch64", product_id: "ocfs2-kmp-default-4.12.14-122.66.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-122.66.2.noarch", product: { name: "kernel-devel-4.12.14-122.66.2.noarch", product_id: "kernel-devel-4.12.14-122.66.2.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-122.66.2.noarch", product: { name: "kernel-docs-4.12.14-122.66.2.noarch", product_id: "kernel-docs-4.12.14-122.66.2.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-122.66.2.noarch", product: { name: "kernel-docs-html-4.12.14-122.66.2.noarch", product_id: "kernel-docs-html-4.12.14-122.66.2.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-122.66.2.noarch", product: { name: "kernel-macros-4.12.14-122.66.2.noarch", product_id: "kernel-macros-4.12.14-122.66.2.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-122.66.2.noarch", product: { name: "kernel-source-4.12.14-122.66.2.noarch", product_id: "kernel-source-4.12.14-122.66.2.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-122.66.2.noarch", product: { name: "kernel-source-vanilla-4.12.14-122.66.2.noarch", product_id: "kernel-source-vanilla-4.12.14-122.66.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.66.2.ppc64le", product: { name: "dlm-kmp-default-4.12.14-122.66.2.ppc64le", product_id: "dlm-kmp-default-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.66.2.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-122.66.2.ppc64le", product_id: "gfs2-kmp-default-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-122.66.2.ppc64le", product: { name: "kernel-debug-4.12.14-122.66.2.ppc64le", product_id: "kernel-debug-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-122.66.2.ppc64le", product: { name: "kernel-debug-base-4.12.14-122.66.2.ppc64le", product_id: "kernel-debug-base-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-122.66.2.ppc64le", product: { name: "kernel-debug-devel-4.12.14-122.66.2.ppc64le", product_id: "kernel-debug-devel-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-122.66.2.ppc64le", product: { name: "kernel-debug-kgraft-devel-4.12.14-122.66.2.ppc64le", product_id: "kernel-debug-kgraft-devel-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.66.2.ppc64le", product: { name: "kernel-default-4.12.14-122.66.2.ppc64le", product_id: "kernel-default-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.66.2.ppc64le", product: { name: "kernel-default-base-4.12.14-122.66.2.ppc64le", product_id: "kernel-default-base-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.66.2.ppc64le", product: { name: "kernel-default-devel-4.12.14-122.66.2.ppc64le", product_id: "kernel-default-devel-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.66.2.ppc64le", product: { name: "kernel-default-extra-4.12.14-122.66.2.ppc64le", product_id: "kernel-default-extra-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.66.2.ppc64le", product: { name: "kernel-default-kgraft-4.12.14-122.66.2.ppc64le", product_id: "kernel-default-kgraft-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", product: { name: "kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", product_id: "kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.66.2.ppc64le", product: { name: "kernel-obs-build-4.12.14-122.66.2.ppc64le", product_id: "kernel-obs-build-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.66.2.ppc64le", product: { name: "kernel-obs-qa-4.12.14-122.66.2.ppc64le", product_id: "kernel-obs-qa-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.66.2.ppc64le", product: { name: "kernel-syms-4.12.14-122.66.2.ppc64le", product_id: "kernel-syms-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.66.2.ppc64le", product: { name: "kernel-vanilla-4.12.14-122.66.2.ppc64le", product_id: "kernel-vanilla-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.66.2.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-122.66.2.ppc64le", product_id: "kernel-vanilla-base-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.66.2.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-122.66.2.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.66.2.ppc64le", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.66.2.ppc64le", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", product: { name: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", product_id: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.66.2.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-122.66.2.ppc64le", product_id: "kselftests-kmp-default-4.12.14-122.66.2.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.66.2.s390x", product: { name: "cluster-md-kmp-default-4.12.14-122.66.2.s390x", product_id: "cluster-md-kmp-default-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.66.2.s390x", product: { name: "dlm-kmp-default-4.12.14-122.66.2.s390x", product_id: "dlm-kmp-default-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.66.2.s390x", product: { name: "gfs2-kmp-default-4.12.14-122.66.2.s390x", product_id: "gfs2-kmp-default-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.66.2.s390x", product: { name: "kernel-default-4.12.14-122.66.2.s390x", product_id: "kernel-default-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.66.2.s390x", product: { name: "kernel-default-base-4.12.14-122.66.2.s390x", product_id: "kernel-default-base-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.66.2.s390x", product: { name: "kernel-default-devel-4.12.14-122.66.2.s390x", product_id: "kernel-default-devel-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.66.2.s390x", product: { name: "kernel-default-extra-4.12.14-122.66.2.s390x", product_id: "kernel-default-extra-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.66.2.s390x", product: { name: "kernel-default-kgraft-4.12.14-122.66.2.s390x", product_id: "kernel-default-kgraft-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", product: { name: "kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", product_id: "kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-122.66.2.s390x", product: { name: "kernel-default-man-4.12.14-122.66.2.s390x", product_id: "kernel-default-man-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.66.2.s390x", product: { name: "kernel-obs-build-4.12.14-122.66.2.s390x", product_id: "kernel-obs-build-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.66.2.s390x", product: { name: "kernel-obs-qa-4.12.14-122.66.2.s390x", product_id: "kernel-obs-qa-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.66.2.s390x", product: { name: "kernel-syms-4.12.14-122.66.2.s390x", product_id: "kernel-syms-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.66.2.s390x", product: { name: "kernel-vanilla-4.12.14-122.66.2.s390x", product_id: "kernel-vanilla-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.66.2.s390x", product: { name: "kernel-vanilla-base-4.12.14-122.66.2.s390x", product_id: "kernel-vanilla-base-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.66.2.s390x", product: { name: "kernel-vanilla-devel-4.12.14-122.66.2.s390x", product_id: "kernel-vanilla-devel-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.66.2.s390x", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.66.2.s390x", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-122.66.2.s390x", product: { name: "kernel-zfcpdump-4.12.14-122.66.2.s390x", product_id: "kernel-zfcpdump-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-122.66.2.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-122.66.2.s390x", product_id: "kernel-zfcpdump-man-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", product: { name: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", product_id: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.66.2.s390x", product: { name: "kselftests-kmp-default-4.12.14-122.66.2.s390x", product_id: "kselftests-kmp-default-4.12.14-122.66.2.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.66.2.s390x", product: { name: "ocfs2-kmp-default-4.12.14-122.66.2.s390x", product_id: "ocfs2-kmp-default-4.12.14-122.66.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.66.2.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-122.66.2.x86_64", product_id: "cluster-md-kmp-default-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.66.2.x86_64", product: { name: "dlm-kmp-default-4.12.14-122.66.2.x86_64", product_id: "dlm-kmp-default-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.66.2.x86_64", product: { name: "gfs2-kmp-default-4.12.14-122.66.2.x86_64", product_id: "gfs2-kmp-default-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-122.66.2.x86_64", product: { name: "kernel-debug-4.12.14-122.66.2.x86_64", product_id: "kernel-debug-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-122.66.2.x86_64", product: { name: "kernel-debug-base-4.12.14-122.66.2.x86_64", product_id: "kernel-debug-base-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-122.66.2.x86_64", product: { name: "kernel-debug-devel-4.12.14-122.66.2.x86_64", product_id: "kernel-debug-devel-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-122.66.2.x86_64", product: { name: "kernel-debug-kgraft-devel-4.12.14-122.66.2.x86_64", product_id: "kernel-debug-kgraft-devel-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.66.2.x86_64", product: { name: "kernel-default-4.12.14-122.66.2.x86_64", product_id: "kernel-default-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.66.2.x86_64", product: { name: "kernel-default-base-4.12.14-122.66.2.x86_64", product_id: "kernel-default-base-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.66.2.x86_64", product: { name: "kernel-default-devel-4.12.14-122.66.2.x86_64", product_id: "kernel-default-devel-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.66.2.x86_64", product: { name: "kernel-default-extra-4.12.14-122.66.2.x86_64", product_id: "kernel-default-extra-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.66.2.x86_64", product: { name: "kernel-default-kgraft-4.12.14-122.66.2.x86_64", product_id: "kernel-default-kgraft-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", product: { name: "kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", product_id: "kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-122.66.2.x86_64", product: { name: "kernel-kvmsmall-4.12.14-122.66.2.x86_64", product_id: "kernel-kvmsmall-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-122.66.2.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-122.66.2.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-122.66.2.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-122.66.2.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-kgraft-devel-4.12.14-122.66.2.x86_64", product: { name: "kernel-kvmsmall-kgraft-devel-4.12.14-122.66.2.x86_64", product_id: "kernel-kvmsmall-kgraft-devel-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.66.2.x86_64", product: { name: "kernel-obs-build-4.12.14-122.66.2.x86_64", product_id: "kernel-obs-build-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.66.2.x86_64", product: { name: "kernel-obs-qa-4.12.14-122.66.2.x86_64", product_id: "kernel-obs-qa-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.66.2.x86_64", product: { name: "kernel-syms-4.12.14-122.66.2.x86_64", product_id: "kernel-syms-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.66.2.x86_64", product: { name: "kernel-vanilla-4.12.14-122.66.2.x86_64", product_id: "kernel-vanilla-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.66.2.x86_64", product: { name: "kernel-vanilla-base-4.12.14-122.66.2.x86_64", product_id: "kernel-vanilla-base-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.66.2.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-122.66.2.x86_64", product_id: "kernel-vanilla-devel-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.66.2.x86_64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.66.2.x86_64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", product: { name: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", product_id: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.66.2.x86_64", product: { name: "kselftests-kmp-default-4.12.14-122.66.2.x86_64", product_id: "kselftests-kmp-default-4.12.14-122.66.2.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.66.2.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-122.66.2.x86_64", product_id: "ocfs2-kmp-default-4.12.14-122.66.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP5", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP5", product: { name: "SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP5", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", }, product_reference: "dlm-kmp-default-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", }, product_reference: "kernel-default-kgraft-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", }, product_reference: "kernel-default-kgraft-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", }, product_reference: "kernel-default-kgraft-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", }, product_reference: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", }, product_reference: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", }, product_reference: "kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-122.66.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", }, product_reference: "kernel-docs-4.12.14-122.66.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.66.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", }, product_reference: "kernel-obs-build-4.12.14-122.66.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", }, product_reference: "kernel-obs-build-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", }, product_reference: "kernel-obs-build-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.66.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", }, product_reference: "kernel-default-4.12.14-122.66.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", }, product_reference: "kernel-default-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", }, product_reference: "kernel-default-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", }, product_reference: "kernel-default-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.66.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", }, product_reference: "kernel-default-base-4.12.14-122.66.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", }, product_reference: "kernel-default-base-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", }, product_reference: "kernel-default-base-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", }, product_reference: "kernel-default-base-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.66.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", }, product_reference: "kernel-default-devel-4.12.14-122.66.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", }, product_reference: "kernel-default-devel-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", }, product_reference: "kernel-default-devel-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", }, product_reference: "kernel-default-man-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-122.66.2.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", }, product_reference: "kernel-devel-4.12.14-122.66.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-122.66.2.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", }, product_reference: "kernel-macros-4.12.14-122.66.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-122.66.2.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", }, product_reference: "kernel-source-4.12.14-122.66.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.66.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", }, product_reference: "kernel-syms-4.12.14-122.66.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", }, product_reference: "kernel-syms-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", }, product_reference: "kernel-syms-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", }, product_reference: "kernel-syms-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.66.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", }, product_reference: "kernel-default-4.12.14-122.66.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", }, product_reference: "kernel-default-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", }, product_reference: "kernel-default-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", }, product_reference: "kernel-default-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.66.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", }, product_reference: "kernel-default-base-4.12.14-122.66.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", }, product_reference: "kernel-default-base-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", }, product_reference: "kernel-default-base-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", }, product_reference: "kernel-default-base-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.66.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", }, product_reference: "kernel-default-devel-4.12.14-122.66.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", }, product_reference: "kernel-default-devel-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", }, product_reference: "kernel-default-devel-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", }, product_reference: "kernel-default-man-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-122.66.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", }, product_reference: "kernel-devel-4.12.14-122.66.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-122.66.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", }, product_reference: "kernel-macros-4.12.14-122.66.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-122.66.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", }, product_reference: "kernel-source-4.12.14-122.66.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.66.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", }, product_reference: "kernel-syms-4.12.14-122.66.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.66.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", }, product_reference: "kernel-syms-4.12.14-122.66.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.66.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", }, product_reference: "kernel-syms-4.12.14-122.66.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", }, product_reference: "kernel-syms-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-122.66.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", }, product_reference: "kernel-default-extra-4.12.14-122.66.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2020-0433", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0433", }, ], notes: [ { category: "general", text: "In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151939299", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0433", url: "https://www.suse.com/security/cve/CVE-2020-0433", }, { category: "external", summary: "SUSE Bug 1176720 for CVE-2020-0433", url: "https://bugzilla.suse.com/1176720", }, { category: "external", summary: "SUSE Bug 1178066 for CVE-2020-0433", url: "https://bugzilla.suse.com/1178066", }, { category: "external", summary: "SUSE Bug 1187135 for CVE-2020-0433", url: "https://bugzilla.suse.com/1187135", }, { category: "external", summary: "SUSE Bug 1189302 for CVE-2020-0433", url: "https://bugzilla.suse.com/1189302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "important", }, ], title: "CVE-2020-0433", }, { cve: "CVE-2020-25670", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25670", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25670", url: "https://www.suse.com/security/cve/CVE-2020-25670", }, { category: "external", summary: "SUSE Bug 1178181 for CVE-2020-25670", url: "https://bugzilla.suse.com/1178181", }, { category: "external", summary: "SUSE Bug 1194680 for CVE-2020-25670", url: "https://bugzilla.suse.com/1194680", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "important", }, ], title: "CVE-2020-25670", }, { cve: "CVE-2020-25671", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25671", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25671", url: "https://www.suse.com/security/cve/CVE-2020-25671", }, { category: "external", summary: "SUSE Bug 1178181 for CVE-2020-25671", url: "https://bugzilla.suse.com/1178181", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "important", }, ], title: "CVE-2020-25671", }, { cve: "CVE-2020-25672", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25672", }, ], notes: [ { category: "general", text: "A memory leak vulnerability was found in Linux kernel in llcp_sock_connect", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25672", url: "https://www.suse.com/security/cve/CVE-2020-25672", }, { category: "external", summary: "SUSE Bug 1178181 for CVE-2020-25672", url: "https://bugzilla.suse.com/1178181", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "important", }, ], title: "CVE-2020-25672", }, { cve: "CVE-2020-25673", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25673", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25673", url: "https://www.suse.com/security/cve/CVE-2020-25673", }, { category: "external", summary: "SUSE Bug 1178181 for CVE-2020-25673", url: "https://bugzilla.suse.com/1178181", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "important", }, ], title: "CVE-2020-25673", }, { cve: "CVE-2020-27170", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27170", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27170", url: "https://www.suse.com/security/cve/CVE-2020-27170", }, { category: "external", summary: "SUSE Bug 1183686 for CVE-2020-27170", url: "https://bugzilla.suse.com/1183686", }, { category: "external", summary: "SUSE Bug 1183775 for CVE-2020-27170", url: "https://bugzilla.suse.com/1183775", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2020-27170", }, { cve: "CVE-2020-27171", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27171", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27171", url: "https://www.suse.com/security/cve/CVE-2020-27171", }, { category: "external", summary: "SUSE Bug 1183686 for CVE-2020-27171", url: "https://bugzilla.suse.com/1183686", }, { category: "external", summary: "SUSE Bug 1183775 for CVE-2020-27171", url: "https://bugzilla.suse.com/1183775", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2020-27171", }, { cve: "CVE-2020-27815", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27815", }, ], notes: [ { category: "general", text: "A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27815", url: "https://www.suse.com/security/cve/CVE-2020-27815", }, { category: "external", summary: "SUSE Bug 1179454 for CVE-2020-27815", url: "https://bugzilla.suse.com/1179454", }, { category: "external", summary: "SUSE Bug 1179458 for CVE-2020-27815", url: "https://bugzilla.suse.com/1179458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "important", }, ], title: "CVE-2020-27815", }, { cve: "CVE-2020-29368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29368", }, ], notes: [ { category: "general", text: "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29368", url: "https://www.suse.com/security/cve/CVE-2020-29368", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179660", }, { category: "external", summary: "SUSE Bug 1179664 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2020-29368", }, { cve: "CVE-2020-29374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29374", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29374", url: "https://www.suse.com/security/cve/CVE-2020-29374", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "low", }, ], title: "CVE-2020-29374", }, { cve: "CVE-2020-35519", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35519", }, ], notes: [ { category: "general", text: "An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35519", url: "https://www.suse.com/security/cve/CVE-2020-35519", }, { category: "external", summary: "SUSE Bug 1183696 for CVE-2020-35519", url: "https://bugzilla.suse.com/1183696", }, { category: "external", summary: "SUSE Bug 1184953 for CVE-2020-35519", url: "https://bugzilla.suse.com/1184953", }, { category: "external", summary: "SUSE Bug 1211495 for CVE-2020-35519", url: "https://bugzilla.suse.com/1211495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "important", }, ], title: "CVE-2020-35519", }, { cve: "CVE-2020-36311", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36311", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36311", url: "https://www.suse.com/security/cve/CVE-2020-36311", }, { category: "external", summary: "SUSE Bug 1184511 for CVE-2020-36311", url: "https://bugzilla.suse.com/1184511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "low", }, ], title: "CVE-2020-36311", }, { cve: "CVE-2021-20219", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-20219", }, ], notes: [ { category: "general", text: "A denial of service vulnerability was found in n_tty_receive_char_special in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could delay the loop (due to a changing ldata->read_head, and a missing sanity check) and cause a threat to the system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-20219", url: "https://www.suse.com/security/cve/CVE-2021-20219", }, { category: "external", summary: "SUSE Bug 1184397 for CVE-2021-20219", url: "https://bugzilla.suse.com/1184397", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-20219", }, { cve: "CVE-2021-26930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26930", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26930", url: "https://www.suse.com/security/cve/CVE-2021-26930", }, { category: "external", summary: "SUSE Bug 1181843 for CVE-2021-26930", url: "https://bugzilla.suse.com/1181843", }, { category: "external", summary: "SUSE Bug 1182294 for CVE-2021-26930", url: "https://bugzilla.suse.com/1182294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "important", }, ], title: "CVE-2021-26930", }, { cve: "CVE-2021-26931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26931", url: "https://www.suse.com/security/cve/CVE-2021-26931", }, { category: "external", summary: "SUSE Bug 1181753 for CVE-2021-26931", url: "https://bugzilla.suse.com/1181753", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-26931", url: "https://bugzilla.suse.com/1183022", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-26931", }, { cve: "CVE-2021-26932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26932", url: "https://www.suse.com/security/cve/CVE-2021-26932", }, { category: "external", summary: "SUSE Bug 1181747 for CVE-2021-26932", url: "https://bugzilla.suse.com/1181747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-26932", }, { cve: "CVE-2021-27363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-27363", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-27363", url: "https://www.suse.com/security/cve/CVE-2021-27363", }, { category: "external", summary: "SUSE Bug 1182716 for CVE-2021-27363", url: "https://bugzilla.suse.com/1182716", }, { category: "external", summary: "SUSE Bug 1182717 for CVE-2021-27363", url: "https://bugzilla.suse.com/1182717", }, { category: "external", summary: "SUSE Bug 1183120 for CVE-2021-27363", url: "https://bugzilla.suse.com/1183120", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-27363", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "important", }, ], title: "CVE-2021-27363", }, { cve: "CVE-2021-27364", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-27364", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-27364", url: "https://www.suse.com/security/cve/CVE-2021-27364", }, { category: "external", summary: "SUSE Bug 1182715 for CVE-2021-27364", url: "https://bugzilla.suse.com/1182715", }, { category: "external", summary: "SUSE Bug 1182716 for CVE-2021-27364", url: "https://bugzilla.suse.com/1182716", }, { category: "external", summary: "SUSE Bug 1182717 for CVE-2021-27364", url: "https://bugzilla.suse.com/1182717", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-27364", url: "https://bugzilla.suse.com/1200084", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2021-27364", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2021-27364", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "important", }, ], title: "CVE-2021-27364", }, { cve: "CVE-2021-27365", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-27365", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-27365", url: "https://www.suse.com/security/cve/CVE-2021-27365", }, { category: "external", summary: "SUSE Bug 1182712 for CVE-2021-27365", url: "https://bugzilla.suse.com/1182712", }, { category: "external", summary: "SUSE Bug 1182715 for CVE-2021-27365", url: "https://bugzilla.suse.com/1182715", }, { category: "external", summary: "SUSE Bug 1183491 for CVE-2021-27365", url: "https://bugzilla.suse.com/1183491", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-27365", url: "https://bugzilla.suse.com/1200084", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2021-27365", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2021-27365", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-27365", }, { cve: "CVE-2021-28038", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28038", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28038", url: "https://www.suse.com/security/cve/CVE-2021-28038", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-28038", url: "https://bugzilla.suse.com/1183022", }, { category: "external", summary: "SUSE Bug 1183069 for CVE-2021-28038", url: "https://bugzilla.suse.com/1183069", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-28038", }, { cve: "CVE-2021-28660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28660", }, ], notes: [ { category: "general", text: "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the ->ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28660", url: "https://www.suse.com/security/cve/CVE-2021-28660", }, { category: "external", summary: "SUSE Bug 1183593 for CVE-2021-28660", url: "https://bugzilla.suse.com/1183593", }, { category: "external", summary: "SUSE Bug 1183658 for CVE-2021-28660", url: "https://bugzilla.suse.com/1183658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "important", }, ], title: "CVE-2021-28660", }, { cve: "CVE-2021-28688", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28688", }, ], notes: [ { category: "general", text: "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28688", url: "https://www.suse.com/security/cve/CVE-2021-28688", }, { category: "external", summary: "SUSE Bug 1183646 for CVE-2021-28688", url: "https://bugzilla.suse.com/1183646", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-28688", }, { cve: "CVE-2021-28964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28964", }, ], notes: [ { category: "general", text: "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28964", url: "https://www.suse.com/security/cve/CVE-2021-28964", }, { category: "external", summary: "SUSE Bug 1184193 for CVE-2021-28964", url: "https://bugzilla.suse.com/1184193", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-28964", }, { cve: "CVE-2021-28971", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28971", }, ], notes: [ { category: "general", text: "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28971", url: "https://www.suse.com/security/cve/CVE-2021-28971", }, { category: "external", summary: "SUSE Bug 1184196 for CVE-2021-28971", url: "https://bugzilla.suse.com/1184196", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-28971", }, { cve: "CVE-2021-28972", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28972", }, ], notes: [ { category: "general", text: "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\\0' termination, aka CID-cc7a0bb058b8.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28972", url: "https://www.suse.com/security/cve/CVE-2021-28972", }, { category: "external", summary: "SUSE Bug 1184198 for CVE-2021-28972", url: "https://bugzilla.suse.com/1184198", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2021-28972", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-28972", }, { cve: "CVE-2021-29154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29154", }, ], notes: [ { category: "general", text: "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29154", url: "https://www.suse.com/security/cve/CVE-2021-29154", }, { category: "external", summary: "SUSE Bug 1184391 for CVE-2021-29154", url: "https://bugzilla.suse.com/1184391", }, { category: "external", summary: "SUSE Bug 1184710 for CVE-2021-29154", url: "https://bugzilla.suse.com/1184710", }, { category: "external", summary: "SUSE Bug 1186408 for CVE-2021-29154", url: "https://bugzilla.suse.com/1186408", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-29154", }, { cve: "CVE-2021-29264", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29264", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29264", url: "https://www.suse.com/security/cve/CVE-2021-29264", }, { category: "external", summary: "SUSE Bug 1184168 for CVE-2021-29264", url: "https://bugzilla.suse.com/1184168", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-29264", }, { cve: "CVE-2021-29265", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29265", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29265", url: "https://www.suse.com/security/cve/CVE-2021-29265", }, { category: "external", summary: "SUSE Bug 1184167 for CVE-2021-29265", url: "https://bugzilla.suse.com/1184167", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-29265", }, { cve: "CVE-2021-29647", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29647", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29647", url: "https://www.suse.com/security/cve/CVE-2021-29647", }, { category: "external", summary: "SUSE Bug 1184192 for CVE-2021-29647", url: "https://bugzilla.suse.com/1184192", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-29647", }, { cve: "CVE-2021-30002", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-30002", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-30002", url: "https://www.suse.com/security/cve/CVE-2021-30002", }, { category: "external", summary: "SUSE Bug 1184120 for CVE-2021-30002", url: "https://bugzilla.suse.com/1184120", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-30002", }, { cve: "CVE-2021-3428", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3428", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3428", url: "https://www.suse.com/security/cve/CVE-2021-3428", }, { category: "external", summary: "SUSE Bug 1173485 for CVE-2021-3428", url: "https://bugzilla.suse.com/1173485", }, { category: "external", summary: "SUSE Bug 1183509 for CVE-2021-3428", url: "https://bugzilla.suse.com/1183509", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "low", }, ], title: "CVE-2021-3428", }, { cve: "CVE-2021-3444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3444", }, ], notes: [ { category: "general", text: "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3444", url: "https://www.suse.com/security/cve/CVE-2021-3444", }, { category: "external", summary: "SUSE Bug 1184170 for CVE-2021-3444", url: "https://bugzilla.suse.com/1184170", }, { category: "external", summary: "SUSE Bug 1184171 for CVE-2021-3444", url: "https://bugzilla.suse.com/1184171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-3444", }, { cve: "CVE-2021-3483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3483", }, ], notes: [ { category: "general", text: "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3483", url: "https://www.suse.com/security/cve/CVE-2021-3483", }, { category: "external", summary: "SUSE Bug 1184393 for CVE-2021-3483", url: "https://bugzilla.suse.com/1184393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-1-8.3.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.66.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.66.2.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-15T13:29:28Z", details: "moderate", }, ], title: "CVE-2021-3483", }, ], }
suse-su-2021:1175-1
Vulnerability from csaf_suse
Published
2021-04-13 15:46
Modified
2021-04-13 15:46
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).
- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access
because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).
- CVE-2020-0433: Fixed a use after free due to improper locking which could have led to local escalation of privilege (bsc#1176720).
The following non-security bugs were fixed:
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- bfq: Fix kABI for update internal depth state when queue depth changes (bsc#1172455).
- bfq: update internal depth state when queue depth changes (bsc#1172455).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf: fix subprog verifier bypass by div/mod by 0 exception (bsc#1184170).
- bpf: fix x64 JIT code generation for jmp to 1st insn (bsc#1178163).
- bpf_lru_list: Read double-checked variable once without lock (git-fixes).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check all path components in resolved dfs target (bsc#1179755).
- cifs_debug: use %pd instead of messing with ->d_name (bsc#1181507).
- cifs: fix nodfs mount option (bsc#1179755).
- cifs: introduce helper for finding referral server (bsc#1179755).
- cifs: New optype for session operations (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (bsc#1104270).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if (bsc#1129770) Backporting notes: * context changes
- drm/atomic: Create __drm_atomic_helper_crtc_reset() for subclassing (bsc#1142635) Backporting notes: * taken for 427c4a0680a2 ('drm/vc4: crtc: Rework a bit the CRTC state code') * renamed drm_atomic_state_helper.{c,h} to drm_atomic_helper.{c,h} * context changes
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1129770) Backporting notes: * context changes
- drm/compat: Clear bounce structures (bsc#1129770) Backporting notes: * context changes
- drm/etnaviv: replace MMU flush marker with flush sequence (bsc#1154048) Backporting notes: * context changes
- drm/gma500: Fix error return code in psb_driver_load() (bsc#1129770)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152446) Backporting notes: * context changes
- drm/mediatek: Fix aal size config (bsc#1129770) Backporting notes: * access I/O memory with writel()
- drm: meson_drv add shutdown function (git-fixes).
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (bsc#1129770)
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm: mxsfb: check framebuffer pitch (bsc#1129770) Backporting notes: * context changes
- drm/omap: fix max fclk divider for omap36xx (bsc#1152446)
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1129770)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1129770) Backporting notes: * context changes
- drm/radeon: fix AGP dependency (git-fixes).
- drm: rcar-du: Put reference to VSP device (bsc#1129770) Backporting notes: * context changes
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1129770) Backporting notes: * context changes
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1129770) Backporting notes: * context changes
- ethernet: alx: fix order of calls on resume (git-fixes).
- fbdev: aty: SPARC64 requires FB_ATY_CT (bsc#1129770)
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- futex: Prevent robust futex exit race (git-fixes).
- gma500: clean up error handling in init (bsc#1129770)
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i40e: Add zero-initialization of AQ command structures (bsc#1109837 bsc#1111981).
- i40e: Fix add TC filter for IPv6 (bsc#1109837 bsc#1111981 ).
- i40e: Fix endianness conversions (bsc#1109837 bsc#1111981 ).
- IB/mlx5: Return appropriate error code instead of ENOMEM (bsc#1103991).
- ibmvnic: add comments for spinlock_t definitions (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).
- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
- ibmvnic: avoid multiple line dereference (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Do not replenish RX buffers after every polling loop (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: fix block comments (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (bsc#1184114 ltc#192237).
- ibmvnic: Fix TX completion error handling (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: prefer strscpy over strlcpy (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: reduce wait for completion time (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: remove excessive irqsave (bsc#1065729).
- ibmvnic: remove never executed if statement (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: send_login should check for crq errors (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: simplify reset_long_term_buff function (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).
- ibmvnic: track pending login (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).
- ice: Account for port VLAN in VF max packet size calculation (bsc#1118661).
- igc: check return value of ret_val in igc_config_fc_after_link_up (bsc#1118657).
- igc: Report speed and duplex as unknown when device is runtime suspended (jsc#SLE-4799).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (bsc#1118657).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: raydium_ts_i2c - do not send zero length (git-fixes).
- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183378).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183379).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183380).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183381).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (bsc#1113994).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kabi/severities: Add rtas_online_cpus_mask, rtas_offline_cpus_mask
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183382).
- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE.
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- net: bridge: use switchdev for port flags set through sysfs too (bsc#1112374).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: core: introduce __netdev_notify_peers (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- net: hns3: add a check for index in hclge_get_rss_key() (bsc#1126390).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (bsc#1104353).
- net: hns3: fix bug when calculating the TCAM table info (bsc#1104353).
- net: hns3: fix query vlan mask value error for flow director (bsc#1104353).
- net/mlx5e: Update max_opened_tc also when channels are closed (bsc#1103990).
- net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8081 (bsc#1119113).
- net: re-solve some conflicts after net -> net-next merge (bsc#1184114 ltc#192237 bsc#1176855 ltc#187293).
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Align checking of syscall user config accessors (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc: Convert to using %pOFn instead of device_node.name (bsc#1181674 ltc#189159).
- powerpc: Fix some spelling mistakes (bsc#1181674 ltc#189159).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/numa: Suppress 'VPHN is not supported' messages (bsc#1181674 ltc#189159).
- powerpc/pseries: Add empty update_numa_cpu_lookup_table() for NUMA=n (bsc#1181674 ltc#189159).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries: Generalize hcall_vphn() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- powerpc/rtas: Unexport rtas_online_cpus_mask, rtas_offline_cpus_mask (bsc#1181674 ltc#189159).
- powerpc/vio: Use device_type to detect family (bsc#1181674 ltc#189159).
- printk: fix deadlock when kernel panic (bsc#1183018).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- random: fix the RNDRESEEDCRNG ioctl (git-fixes).
- rcu: Allow only one expedited GP to run concurrently with (git-fixes)
- rcu: Fix missed wakeup of exp_wq waiters (git-fixes)
- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (bsc#1103991).
- RDMA/rxe: Remove useless code in rxe_recv.c (bsc#1103992 ).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- RDMA/uverbs: Fix kernel-doc warning of _uverbs_alloc (bsc#1103992).
- Revert 'ibmvnic: remove never executed if statement' (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).
- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).
- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).
- s390/vtime: fix increased steal time accounting (bsc#1183861).
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/vtime: Fix guest/system mis-accounting on task switch (git-fixes)
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix ancient double free (bsc#1182574).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1182574).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix kerneldoc inconsistency in lpfc_sli4_dump_page_a0() (bsc#1182574).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix 'physical' typos (bsc#1182574).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- selinux: never allow relabeling on context mounts (git-fixes).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).
- USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- USBip: fix stub_dev to check for stream socket (git-fixes).
- USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- USBip: Fix unsafe unaligned pointer usage (git-fixes).
- USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd to check for stream socket (git-fixes).
- USBip: tools: fix build error for multiple definition (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: replace hardcode maximum usb string length by definition (git-fixes).
- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-commit).
- use __netdev_notify_peers in ibmvnic (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1129770)
- video: fbdev: atmel_lcdfb: fix return error code in (bsc#1129770) Backporting notes: * context changes * fallout from trailing whitespaces
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).
- xsk: Remove dangling function declaration from header file (bsc#1109837).
Patchnames
SUSE-2021-1175,SUSE-SLE-SERVER-12-SP5-2021-1175
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).\n- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).\n- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).\n- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).\n- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).\n- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).\n- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).\n- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).\n- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).\n- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).\n- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).\n- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).\n- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).\n- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).\n- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).\n- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).\n- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).\n- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).\n- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).\n- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).\n- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access \n because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).\n- CVE-2020-0433: Fixed a use after free due to improper locking which could have led to local escalation of privilege (bsc#1176720).\n\nThe following non-security bugs were fixed:\n\n- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).\n- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).\n- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).\n- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).\n- amba: Fix resource leak for drivers without .remove (git-fixes).\n- bfq: Fix kABI for update internal depth state when queue depth changes (bsc#1172455).\n- bfq: update internal depth state when queue depth changes (bsc#1172455).\n- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).\n- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).\n- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).\n- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).\n- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).\n- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).\n- bpf: fix subprog verifier bypass by div/mod by 0 exception (bsc#1184170).\n- bpf: fix x64 JIT code generation for jmp to 1st insn (bsc#1178163).\n- bpf_lru_list: Read double-checked variable once without lock (git-fixes).\n- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).\n- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).\n- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).\n- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).\n- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).\n- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).\n- can: peak_usb: add forgotten supported devices (git-fixes).\n- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).\n- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).\n- cifs: change noisy error message to FYI (bsc#1181507).\n- cifs: check all path components in resolved dfs target (bsc#1179755).\n- cifs_debug: use %pd instead of messing with ->d_name (bsc#1181507).\n- cifs: fix nodfs mount option (bsc#1179755).\n- cifs: introduce helper for finding referral server (bsc#1179755).\n- cifs: New optype for session operations (bsc#1181507).\n- cifs: print MIDs in decimal notation (bsc#1181507).\n- cifs: return proper error code in statfs(2) (bsc#1181507).\n- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (bsc#1104270).\n- dmaengine: hsu: disable spurious interrupt (git-fixes).\n- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if (bsc#1129770) Backporting notes: \t* context changes\n- drm/atomic: Create __drm_atomic_helper_crtc_reset() for subclassing (bsc#1142635) Backporting notes: \t* taken for 427c4a0680a2 ('drm/vc4: crtc: Rework a bit the CRTC state code') \t* renamed drm_atomic_state_helper.{c,h} to drm_atomic_helper.{c,h} \t* context changes\n- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1129770) Backporting notes: \t* context changes\n- drm/compat: Clear bounce structures (bsc#1129770) Backporting notes: \t* context changes\n- drm/etnaviv: replace MMU flush marker with flush sequence (bsc#1154048) Backporting notes: \t* context changes\n- drm/gma500: Fix error return code in psb_driver_load() (bsc#1129770)\n- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152446) Backporting notes: \t* context changes\n- drm/mediatek: Fix aal size config (bsc#1129770) Backporting notes: \t* access I/O memory with writel()\n- drm: meson_drv add shutdown function (git-fixes).\n- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).\n- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (bsc#1129770)\n- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).\n- drm: mxsfb: check framebuffer pitch (bsc#1129770) Backporting notes: \t* context changes\n- drm/omap: fix max fclk divider for omap36xx (bsc#1152446)\n- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1129770)\n- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1129770) Backporting notes: \t* context changes\n- drm/radeon: fix AGP dependency (git-fixes).\n- drm: rcar-du: Put reference to VSP device (bsc#1129770) Backporting notes: \t* context changes\n- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1129770) Backporting notes: \t* context changes\n- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1129770) Backporting notes: \t* context changes\n- ethernet: alx: fix order of calls on resume (git-fixes).\n- fbdev: aty: SPARC64 requires FB_ATY_CT (bsc#1129770)\n- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).\n- futex: Prevent robust futex exit race (git-fixes).\n- gma500: clean up error handling in init (bsc#1129770)\n- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).\n- HID: make arrays usage and value to be the same (git-fixes).\n- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).\n- i40e: Add zero-initialization of AQ command structures (bsc#1109837 bsc#1111981).\n- i40e: Fix add TC filter for IPv6 (bsc#1109837 bsc#1111981 ).\n- i40e: Fix endianness conversions (bsc#1109837 bsc#1111981 ).\n- IB/mlx5: Return appropriate error code instead of ENOMEM (bsc#1103991).\n- ibmvnic: add comments for spinlock_t definitions (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: add memory barrier to protect long term buffer (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).\n- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).\n- ibmvnic: avoid multiple line dereference (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: create send_control_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: create send_query_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Do not replenish RX buffers after every polling loop (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).\n- ibmvnic: Ensure that device queue memory is cache-line aligned (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: fix block comments (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: fix braces (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: fix miscellaneous checks (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (bsc#1184114 ltc#192237).\n- ibmvnic: Fix TX completion error handling (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Fix use-after-free of VNIC login response buffer (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: handle inconsistent login with reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Harden device Command Response Queue handshake (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: merge do_change_param_reset into do_reset (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: no reset timeout for 5 seconds after reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: prefer strscpy over strlcpy (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: reduce wait for completion time (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: remove excessive irqsave (bsc#1065729).\n- ibmvnic: remove never executed if statement (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_cap_queries to send_query_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_map_query to send_query_map (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: send_login should check for crq errors (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: simplify reset_long_term_buff function (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).\n- ibmvnic: skip send_request_unmap for timeout reset (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).\n- ibmvnic: skip tx timeout reset while in resetting (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: stop free_all_rwi on failed reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).\n- ibmvnic: track pending login (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).\n- ice: Account for port VLAN in VF max packet size calculation (bsc#1118661).\n- igc: check return value of ret_val in igc_config_fc_after_link_up (bsc#1118657).\n- igc: Report speed and duplex as unknown when device is runtime suspended (jsc#SLE-4799).\n- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (bsc#1118657).\n- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).\n- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).\n- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).\n- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).\n- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).\n- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).\n- Input: i8042 - unbreak Pegatron C15B (git-fixes).\n- Input: raydium_ts_i2c - do not send zero length (git-fixes).\n- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).\n- Input: xpad - sync supported devices with fork on GitHub (git-fixes).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183378).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183379).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183380).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183381).\n- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (bsc#1113994).\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kabi/severities: Add rtas_online_cpus_mask, rtas_offline_cpus_mask\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: add more data to CSD lock debugging (bsc#1180846).\n- kernel/smp: prepare more CSD lock debugging (bsc#1180846).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183382).\n- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).\n- mac80211: fix double free in ibss_leave (git-fixes).\n- mac80211: fix rate mask reset (git-fixes).\n- media: usbtv: Fix deadlock on suspend (git-fixes).\n- media: uvcvideo: Allow entities with no pads (git-fixes).\n- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).\n- mmc: core: Fix partition switch time for eMMC (git-fixes).\n- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE.\n- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).\n- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).\n- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).\n- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).\n- net: bridge: use switchdev for port flags set through sysfs too (bsc#1112374).\n- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).\n- net: core: introduce __netdev_notify_peers (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- net: hns3: add a check for index in hclge_get_rss_key() (bsc#1126390).\n- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (bsc#1104353).\n- net: hns3: fix bug when calculating the TCAM table info (bsc#1104353).\n- net: hns3: fix query vlan mask value error for flow director (bsc#1104353).\n- net/mlx5e: Update max_opened_tc also when channels are closed (bsc#1103990).\n- net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8081 (bsc#1119113).\n- net: re-solve some conflicts after net -> net-next merge (bsc#1184114 ltc#192237 bsc#1176855 ltc#187293).\n- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).\n- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).\n- PCI: Align checking of syscall user config accessors (git-fixes).\n- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).\n- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).\n- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).\n- powerpc: Convert to using %pOFn instead of device_node.name (bsc#1181674 ltc#189159).\n- powerpc: Fix some spelling mistakes (bsc#1181674 ltc#189159).\n- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).\n- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).\n- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).\n- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).\n- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).\n- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).\n- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).\n- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).\n- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).\n- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).\n- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).\n- powerpc/numa: Suppress 'VPHN is not supported' messages (bsc#1181674 ltc#189159).\n- powerpc/pseries: Add empty update_numa_cpu_lookup_table() for NUMA=n (bsc#1181674 ltc#189159).\n- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).\n- powerpc/pseries: Generalize hcall_vphn() (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).\n- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).\n- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).\n- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).\n- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).\n- powerpc/rtas: Unexport rtas_online_cpus_mask, rtas_offline_cpus_mask (bsc#1181674 ltc#189159).\n- powerpc/vio: Use device_type to detect family (bsc#1181674 ltc#189159).\n- printk: fix deadlock when kernel panic (bsc#1183018).\n- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).\n- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).\n- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).\n- qxl: Fix uninitialised struct field head.surface_id (git-fixes).\n- random: fix the RNDRESEEDCRNG ioctl (git-fixes).\n- rcu: Allow only one expedited GP to run concurrently with (git-fixes)\n- rcu: Fix missed wakeup of exp_wq waiters (git-fixes)\n- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (bsc#1103991).\n- RDMA/rxe: Remove useless code in rxe_recv.c (bsc#1103992 ).\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/uverbs: Fix kernel-doc warning of _uverbs_alloc (bsc#1103992).\n- Revert 'ibmvnic: remove never executed if statement' (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).\n- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).\n- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).\n- s390/vtime: fix increased steal time accounting (bsc#1183861).\n- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)\n- sched/vtime: Fix guest/system mis-accounting on task switch (git-fixes)\n- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).\n- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).\n- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).\n- scsi: lpfc: Fix ancient double free (bsc#1182574).\n- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).\n- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).\n- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1182574).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).\n- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).\n- scsi: lpfc: Fix kerneldoc inconsistency in lpfc_sli4_dump_page_a0() (bsc#1182574).\n- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).\n- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).\n- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).\n- scsi: lpfc: Fix 'physical' typos (bsc#1182574).\n- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).\n- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).\n- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).\n- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).\n- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).\n- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).\n- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).\n- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).\n- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).\n- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).\n- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).\n- selinux: never allow relabeling on context mounts (git-fixes).\n- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).\n- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).\n- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).\n- Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).\n- USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).\n- USBip: fix stub_dev to check for stream socket (git-fixes).\n- USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).\n- USBip: Fix unsafe unaligned pointer usage (git-fixes).\n- USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).\n- USBip: fix vhci_hcd to check for stream socket (git-fixes).\n- USBip: tools: fix build error for multiple definition (git-fixes).\n- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).\n- USB: replace hardcode maximum usb string length by definition (git-fixes).\n- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).\n- USB: serial: option: add Quectel EM160R-GL (git-fixes).\n- USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).\n- USB: usblp: do not call usb_set_interface if there's a single alt (git-commit).\n- use __netdev_notify_peers in ibmvnic (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- video: fbdev: acornfb: remove free_unused_pages() (bsc#1129770)\n- video: fbdev: atmel_lcdfb: fix return error code in (bsc#1129770) Backporting notes: \t* context changes \t* fallout from trailing whitespaces\n- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).\n- xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).\n- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).\n- xsk: Remove dangling function declaration from header file (bsc#1109837).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-1175,SUSE-SLE-SERVER-12-SP5-2021-1175", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1175-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:1175-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20211175-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:1175-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103991", url: "https://bugzilla.suse.com/1103991", }, { category: "self", summary: "SUSE Bug 1103992", url: "https://bugzilla.suse.com/1103992", }, { category: "self", summary: "SUSE Bug 1104270", url: "https://bugzilla.suse.com/1104270", }, { category: "self", summary: "SUSE Bug 1104353", url: "https://bugzilla.suse.com/1104353", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1111981", url: "https://bugzilla.suse.com/1111981", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1113994", url: "https://bugzilla.suse.com/1113994", }, { category: "self", summary: "SUSE Bug 1118657", url: "https://bugzilla.suse.com/1118657", }, { category: "self", summary: "SUSE Bug 1118661", url: "https://bugzilla.suse.com/1118661", }, { category: "self", summary: "SUSE Bug 1119113", url: "https://bugzilla.suse.com/1119113", }, { category: "self", summary: "SUSE Bug 1126390", url: "https://bugzilla.suse.com/1126390", }, { category: "self", summary: "SUSE Bug 1129770", url: "https://bugzilla.suse.com/1129770", }, { category: "self", summary: "SUSE Bug 1132477", url: "https://bugzilla.suse.com/1132477", }, { category: "self", summary: "SUSE Bug 1142635", url: "https://bugzilla.suse.com/1142635", }, { category: "self", summary: "SUSE Bug 1152446", url: "https://bugzilla.suse.com/1152446", }, { category: "self", summary: "SUSE Bug 1154048", url: "https://bugzilla.suse.com/1154048", }, { category: "self", summary: "SUSE Bug 1169709", url: "https://bugzilla.suse.com/1169709", }, { category: "self", summary: "SUSE Bug 1172455", url: "https://bugzilla.suse.com/1172455", }, { category: "self", summary: "SUSE Bug 1173485", url: "https://bugzilla.suse.com/1173485", }, { category: "self", summary: "SUSE Bug 1175165", url: "https://bugzilla.suse.com/1175165", }, { category: "self", summary: "SUSE Bug 1176720", url: "https://bugzilla.suse.com/1176720", }, { category: "self", summary: "SUSE Bug 1176855", url: "https://bugzilla.suse.com/1176855", }, { category: "self", summary: "SUSE Bug 1178163", url: "https://bugzilla.suse.com/1178163", }, { category: "self", summary: "SUSE Bug 1179243", url: "https://bugzilla.suse.com/1179243", }, { category: "self", summary: "SUSE Bug 1179428", url: "https://bugzilla.suse.com/1179428", }, { category: "self", summary: "SUSE Bug 1179454", url: "https://bugzilla.suse.com/1179454", }, { category: "self", summary: "SUSE Bug 1179660", url: "https://bugzilla.suse.com/1179660", }, { category: "self", summary: "SUSE Bug 1179755", url: "https://bugzilla.suse.com/1179755", }, { category: "self", summary: "SUSE Bug 1180846", url: "https://bugzilla.suse.com/1180846", }, { category: "self", summary: "SUSE Bug 1181507", url: "https://bugzilla.suse.com/1181507", }, { category: "self", summary: "SUSE Bug 1181515", url: "https://bugzilla.suse.com/1181515", }, { category: "self", summary: "SUSE Bug 1181544", url: "https://bugzilla.suse.com/1181544", }, { category: "self", summary: "SUSE Bug 1181655", url: "https://bugzilla.suse.com/1181655", }, { category: "self", summary: "SUSE Bug 1181674", url: "https://bugzilla.suse.com/1181674", }, { category: "self", summary: "SUSE Bug 1181747", url: "https://bugzilla.suse.com/1181747", }, { category: "self", summary: "SUSE Bug 1181753", url: "https://bugzilla.suse.com/1181753", }, { category: "self", summary: "SUSE Bug 1181843", url: "https://bugzilla.suse.com/1181843", }, { category: "self", summary: "SUSE Bug 1182011", url: "https://bugzilla.suse.com/1182011", }, { category: "self", summary: "SUSE Bug 1182175", url: "https://bugzilla.suse.com/1182175", }, { category: "self", summary: "SUSE Bug 1182485", url: "https://bugzilla.suse.com/1182485", }, { category: "self", summary: "SUSE Bug 1182574", url: "https://bugzilla.suse.com/1182574", }, { category: "self", summary: "SUSE Bug 1182715", url: "https://bugzilla.suse.com/1182715", }, { category: "self", summary: "SUSE Bug 1182716", url: "https://bugzilla.suse.com/1182716", }, { category: "self", summary: "SUSE Bug 1182717", url: "https://bugzilla.suse.com/1182717", }, { category: "self", summary: "SUSE Bug 1183018", url: "https://bugzilla.suse.com/1183018", }, { category: "self", summary: "SUSE Bug 1183022", url: "https://bugzilla.suse.com/1183022", }, { category: "self", summary: "SUSE Bug 1183023", url: "https://bugzilla.suse.com/1183023", }, { category: "self", summary: "SUSE Bug 1183378", url: "https://bugzilla.suse.com/1183378", }, { category: "self", summary: "SUSE Bug 1183379", url: "https://bugzilla.suse.com/1183379", }, { category: "self", summary: "SUSE Bug 1183380", url: "https://bugzilla.suse.com/1183380", }, { category: "self", summary: "SUSE Bug 1183381", url: "https://bugzilla.suse.com/1183381", }, { category: "self", summary: "SUSE Bug 1183382", url: "https://bugzilla.suse.com/1183382", }, { category: "self", summary: "SUSE Bug 1183416", url: "https://bugzilla.suse.com/1183416", }, { category: "self", summary: "SUSE Bug 1183509", url: "https://bugzilla.suse.com/1183509", }, { category: "self", summary: "SUSE Bug 1183593", url: "https://bugzilla.suse.com/1183593", }, { category: "self", summary: "SUSE Bug 1183646", url: "https://bugzilla.suse.com/1183646", }, { category: "self", summary: "SUSE Bug 1183662", url: "https://bugzilla.suse.com/1183662", }, { category: "self", summary: "SUSE Bug 1183686", url: "https://bugzilla.suse.com/1183686", }, { category: "self", summary: "SUSE Bug 1183692", url: "https://bugzilla.suse.com/1183692", }, { category: "self", summary: "SUSE Bug 1183696", url: "https://bugzilla.suse.com/1183696", }, { category: "self", summary: "SUSE Bug 1183775", url: "https://bugzilla.suse.com/1183775", }, { category: "self", summary: "SUSE Bug 1183861", url: "https://bugzilla.suse.com/1183861", }, { category: "self", summary: "SUSE Bug 1183871", url: "https://bugzilla.suse.com/1183871", }, { category: "self", summary: "SUSE Bug 1184114", url: "https://bugzilla.suse.com/1184114", }, { category: "self", summary: "SUSE Bug 1184167", url: "https://bugzilla.suse.com/1184167", }, { category: "self", summary: "SUSE Bug 1184168", url: "https://bugzilla.suse.com/1184168", }, { category: "self", summary: "SUSE Bug 1184170", url: "https://bugzilla.suse.com/1184170", }, { category: "self", summary: "SUSE Bug 1184192", url: "https://bugzilla.suse.com/1184192", }, { category: "self", summary: "SUSE Bug 1184193", url: "https://bugzilla.suse.com/1184193", }, { category: "self", summary: "SUSE Bug 1184196", url: "https://bugzilla.suse.com/1184196", }, { category: "self", summary: "SUSE Bug 1184198", url: "https://bugzilla.suse.com/1184198", }, { category: "self", summary: "SUSE CVE CVE-2020-0433 page", url: "https://www.suse.com/security/cve/CVE-2020-0433/", }, { category: "self", summary: "SUSE CVE CVE-2020-27170 page", url: "https://www.suse.com/security/cve/CVE-2020-27170/", }, { category: "self", summary: "SUSE CVE CVE-2020-27171 page", url: "https://www.suse.com/security/cve/CVE-2020-27171/", }, { category: "self", summary: "SUSE CVE CVE-2020-27815 page", url: "https://www.suse.com/security/cve/CVE-2020-27815/", }, { category: "self", summary: "SUSE CVE CVE-2020-29368 page", url: "https://www.suse.com/security/cve/CVE-2020-29368/", }, { category: "self", summary: "SUSE CVE CVE-2020-29374 page", url: "https://www.suse.com/security/cve/CVE-2020-29374/", }, { category: "self", summary: "SUSE CVE CVE-2020-35519 page", url: "https://www.suse.com/security/cve/CVE-2020-35519/", }, { category: "self", summary: "SUSE CVE CVE-2021-26930 page", url: "https://www.suse.com/security/cve/CVE-2021-26930/", }, { category: "self", summary: "SUSE CVE CVE-2021-26931 page", url: "https://www.suse.com/security/cve/CVE-2021-26931/", }, { category: "self", summary: "SUSE CVE CVE-2021-26932 page", url: "https://www.suse.com/security/cve/CVE-2021-26932/", }, { category: "self", summary: "SUSE CVE CVE-2021-27363 page", url: "https://www.suse.com/security/cve/CVE-2021-27363/", }, { category: "self", summary: "SUSE CVE CVE-2021-27364 page", url: "https://www.suse.com/security/cve/CVE-2021-27364/", }, { category: "self", summary: "SUSE CVE CVE-2021-27365 page", url: "https://www.suse.com/security/cve/CVE-2021-27365/", }, { category: "self", summary: "SUSE CVE CVE-2021-28038 page", url: "https://www.suse.com/security/cve/CVE-2021-28038/", }, { category: "self", summary: "SUSE CVE CVE-2021-28660 page", url: "https://www.suse.com/security/cve/CVE-2021-28660/", }, { category: "self", summary: "SUSE CVE CVE-2021-28688 page", url: "https://www.suse.com/security/cve/CVE-2021-28688/", }, { category: "self", summary: "SUSE CVE CVE-2021-28964 page", url: "https://www.suse.com/security/cve/CVE-2021-28964/", }, { category: "self", summary: "SUSE CVE CVE-2021-28971 page", url: "https://www.suse.com/security/cve/CVE-2021-28971/", }, { category: "self", summary: "SUSE CVE CVE-2021-28972 page", url: "https://www.suse.com/security/cve/CVE-2021-28972/", }, { category: "self", summary: "SUSE CVE CVE-2021-29264 page", url: "https://www.suse.com/security/cve/CVE-2021-29264/", }, { category: "self", summary: "SUSE CVE CVE-2021-29265 page", url: "https://www.suse.com/security/cve/CVE-2021-29265/", }, { category: "self", summary: "SUSE CVE CVE-2021-29647 page", url: "https://www.suse.com/security/cve/CVE-2021-29647/", }, { category: "self", summary: "SUSE CVE CVE-2021-3428 page", url: "https://www.suse.com/security/cve/CVE-2021-3428/", }, { category: "self", summary: "SUSE CVE CVE-2021-3444 page", url: "https://www.suse.com/security/cve/CVE-2021-3444/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-04-13T15:46:00Z", generator: { date: "2021-04-13T15:46:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:1175-1", initial_release_date: "2021-04-13T15:46:00Z", revision_history: [ { date: "2021-04-13T15:46:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-4.12.14-16.50.1.noarch", product: { name: "kernel-devel-azure-4.12.14-16.50.1.noarch", product_id: "kernel-devel-azure-4.12.14-16.50.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.12.14-16.50.1.noarch", product: { name: "kernel-source-azure-4.12.14-16.50.1.noarch", product_id: "kernel-source-azure-4.12.14-16.50.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-4.12.14-16.50.1.x86_64", product: { name: "cluster-md-kmp-azure-4.12.14-16.50.1.x86_64", product_id: "cluster-md-kmp-azure-4.12.14-16.50.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-4.12.14-16.50.1.x86_64", product: { name: "dlm-kmp-azure-4.12.14-16.50.1.x86_64", product_id: "dlm-kmp-azure-4.12.14-16.50.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-4.12.14-16.50.1.x86_64", product: { name: "gfs2-kmp-azure-4.12.14-16.50.1.x86_64", product_id: "gfs2-kmp-azure-4.12.14-16.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-4.12.14-16.50.1.x86_64", product: { name: "kernel-azure-4.12.14-16.50.1.x86_64", product_id: "kernel-azure-4.12.14-16.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.12.14-16.50.1.x86_64", product: { name: "kernel-azure-base-4.12.14-16.50.1.x86_64", product_id: "kernel-azure-base-4.12.14-16.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.12.14-16.50.1.x86_64", product: { name: "kernel-azure-devel-4.12.14-16.50.1.x86_64", product_id: "kernel-azure-devel-4.12.14-16.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-4.12.14-16.50.1.x86_64", product: { name: "kernel-azure-extra-4.12.14-16.50.1.x86_64", product_id: "kernel-azure-extra-4.12.14-16.50.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-kgraft-devel-4.12.14-16.50.1.x86_64", product: { name: "kernel-azure-kgraft-devel-4.12.14-16.50.1.x86_64", product_id: "kernel-azure-kgraft-devel-4.12.14-16.50.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.12.14-16.50.1.x86_64", product: { name: "kernel-syms-azure-4.12.14-16.50.1.x86_64", product_id: "kernel-syms-azure-4.12.14-16.50.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-4.12.14-16.50.1.x86_64", product: { name: "kselftests-kmp-azure-4.12.14-16.50.1.x86_64", product_id: "kselftests-kmp-azure-4.12.14-16.50.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-4.12.14-16.50.1.x86_64", product: { name: "ocfs2-kmp-azure-4.12.14-16.50.1.x86_64", product_id: "ocfs2-kmp-azure-4.12.14-16.50.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-16.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", }, product_reference: "kernel-azure-4.12.14-16.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-16.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-16.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-16.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-16.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-16.50.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-16.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-16.50.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-16.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-16.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-16.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-16.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", }, product_reference: "kernel-azure-4.12.14-16.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-16.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-16.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-16.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-16.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-16.50.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-16.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-16.50.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-16.50.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-16.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-16.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2020-0433", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0433", }, ], notes: [ { category: "general", text: "In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151939299", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0433", url: "https://www.suse.com/security/cve/CVE-2020-0433", }, { category: "external", summary: "SUSE Bug 1176720 for CVE-2020-0433", url: "https://bugzilla.suse.com/1176720", }, { category: "external", summary: "SUSE Bug 1178066 for CVE-2020-0433", url: "https://bugzilla.suse.com/1178066", }, { category: "external", summary: "SUSE Bug 1187135 for CVE-2020-0433", url: "https://bugzilla.suse.com/1187135", }, { category: "external", summary: "SUSE Bug 1189302 for CVE-2020-0433", url: "https://bugzilla.suse.com/1189302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "important", }, ], title: "CVE-2020-0433", }, { cve: "CVE-2020-27170", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27170", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27170", url: "https://www.suse.com/security/cve/CVE-2020-27170", }, { category: "external", summary: "SUSE Bug 1183686 for CVE-2020-27170", url: "https://bugzilla.suse.com/1183686", }, { category: "external", summary: "SUSE Bug 1183775 for CVE-2020-27170", url: "https://bugzilla.suse.com/1183775", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2020-27170", }, { cve: "CVE-2020-27171", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27171", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27171", url: "https://www.suse.com/security/cve/CVE-2020-27171", }, { category: "external", summary: "SUSE Bug 1183686 for CVE-2020-27171", url: "https://bugzilla.suse.com/1183686", }, { category: "external", summary: "SUSE Bug 1183775 for CVE-2020-27171", url: "https://bugzilla.suse.com/1183775", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2020-27171", }, { cve: "CVE-2020-27815", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27815", }, ], notes: [ { category: "general", text: "A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27815", url: "https://www.suse.com/security/cve/CVE-2020-27815", }, { category: "external", summary: "SUSE Bug 1179454 for CVE-2020-27815", url: "https://bugzilla.suse.com/1179454", }, { category: "external", summary: "SUSE Bug 1179458 for CVE-2020-27815", url: "https://bugzilla.suse.com/1179458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "important", }, ], title: "CVE-2020-27815", }, { cve: "CVE-2020-29368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29368", }, ], notes: [ { category: "general", text: "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29368", url: "https://www.suse.com/security/cve/CVE-2020-29368", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179660", }, { category: "external", summary: "SUSE Bug 1179664 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2020-29368", }, { cve: "CVE-2020-29374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29374", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29374", url: "https://www.suse.com/security/cve/CVE-2020-29374", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "low", }, ], title: "CVE-2020-29374", }, { cve: "CVE-2020-35519", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35519", }, ], notes: [ { category: "general", text: "An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35519", url: "https://www.suse.com/security/cve/CVE-2020-35519", }, { category: "external", summary: "SUSE Bug 1183696 for CVE-2020-35519", url: "https://bugzilla.suse.com/1183696", }, { category: "external", summary: "SUSE Bug 1184953 for CVE-2020-35519", url: "https://bugzilla.suse.com/1184953", }, { category: "external", summary: "SUSE Bug 1211495 for CVE-2020-35519", url: "https://bugzilla.suse.com/1211495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "important", }, ], title: "CVE-2020-35519", }, { cve: "CVE-2021-26930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26930", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26930", url: "https://www.suse.com/security/cve/CVE-2021-26930", }, { category: "external", summary: "SUSE Bug 1181843 for CVE-2021-26930", url: "https://bugzilla.suse.com/1181843", }, { category: "external", summary: "SUSE Bug 1182294 for CVE-2021-26930", url: "https://bugzilla.suse.com/1182294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "important", }, ], title: "CVE-2021-26930", }, { cve: "CVE-2021-26931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26931", url: "https://www.suse.com/security/cve/CVE-2021-26931", }, { category: "external", summary: "SUSE Bug 1181753 for CVE-2021-26931", url: "https://bugzilla.suse.com/1181753", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-26931", url: "https://bugzilla.suse.com/1183022", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2021-26931", }, { cve: "CVE-2021-26932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26932", url: "https://www.suse.com/security/cve/CVE-2021-26932", }, { category: "external", summary: "SUSE Bug 1181747 for CVE-2021-26932", url: "https://bugzilla.suse.com/1181747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2021-26932", }, { cve: "CVE-2021-27363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-27363", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-27363", url: "https://www.suse.com/security/cve/CVE-2021-27363", }, { category: "external", summary: "SUSE Bug 1182716 for CVE-2021-27363", url: "https://bugzilla.suse.com/1182716", }, { category: "external", summary: "SUSE Bug 1182717 for CVE-2021-27363", url: "https://bugzilla.suse.com/1182717", }, { category: "external", summary: "SUSE Bug 1183120 for CVE-2021-27363", url: "https://bugzilla.suse.com/1183120", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-27363", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "important", }, ], title: "CVE-2021-27363", }, { cve: "CVE-2021-27364", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-27364", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-27364", url: "https://www.suse.com/security/cve/CVE-2021-27364", }, { category: "external", summary: "SUSE Bug 1182715 for CVE-2021-27364", url: "https://bugzilla.suse.com/1182715", }, { category: "external", summary: "SUSE Bug 1182716 for CVE-2021-27364", url: "https://bugzilla.suse.com/1182716", }, { category: "external", summary: "SUSE Bug 1182717 for CVE-2021-27364", url: "https://bugzilla.suse.com/1182717", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-27364", url: "https://bugzilla.suse.com/1200084", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2021-27364", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2021-27364", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "important", }, ], title: "CVE-2021-27364", }, { cve: "CVE-2021-27365", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-27365", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-27365", url: "https://www.suse.com/security/cve/CVE-2021-27365", }, { category: "external", summary: "SUSE Bug 1182712 for CVE-2021-27365", url: "https://bugzilla.suse.com/1182712", }, { category: "external", summary: "SUSE Bug 1182715 for CVE-2021-27365", url: "https://bugzilla.suse.com/1182715", }, { category: "external", summary: "SUSE Bug 1183491 for CVE-2021-27365", url: "https://bugzilla.suse.com/1183491", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-27365", url: "https://bugzilla.suse.com/1200084", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2021-27365", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2021-27365", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2021-27365", }, { cve: "CVE-2021-28038", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28038", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28038", url: "https://www.suse.com/security/cve/CVE-2021-28038", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-28038", url: "https://bugzilla.suse.com/1183022", }, { category: "external", summary: "SUSE Bug 1183069 for CVE-2021-28038", url: "https://bugzilla.suse.com/1183069", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2021-28038", }, { cve: "CVE-2021-28660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28660", }, ], notes: [ { category: "general", text: "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the ->ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28660", url: "https://www.suse.com/security/cve/CVE-2021-28660", }, { category: "external", summary: "SUSE Bug 1183593 for CVE-2021-28660", url: "https://bugzilla.suse.com/1183593", }, { category: "external", summary: "SUSE Bug 1183658 for CVE-2021-28660", url: "https://bugzilla.suse.com/1183658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "important", }, ], title: "CVE-2021-28660", }, { cve: "CVE-2021-28688", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28688", }, ], notes: [ { category: "general", text: "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28688", url: "https://www.suse.com/security/cve/CVE-2021-28688", }, { category: "external", summary: "SUSE Bug 1183646 for CVE-2021-28688", url: "https://bugzilla.suse.com/1183646", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2021-28688", }, { cve: "CVE-2021-28964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28964", }, ], notes: [ { category: "general", text: "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28964", url: "https://www.suse.com/security/cve/CVE-2021-28964", }, { category: "external", summary: "SUSE Bug 1184193 for CVE-2021-28964", url: "https://bugzilla.suse.com/1184193", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2021-28964", }, { cve: "CVE-2021-28971", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28971", }, ], notes: [ { category: "general", text: "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28971", url: "https://www.suse.com/security/cve/CVE-2021-28971", }, { category: "external", summary: "SUSE Bug 1184196 for CVE-2021-28971", url: "https://bugzilla.suse.com/1184196", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2021-28971", }, { cve: "CVE-2021-28972", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28972", }, ], notes: [ { category: "general", text: "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\\0' termination, aka CID-cc7a0bb058b8.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28972", url: "https://www.suse.com/security/cve/CVE-2021-28972", }, { category: "external", summary: "SUSE Bug 1184198 for CVE-2021-28972", url: "https://bugzilla.suse.com/1184198", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2021-28972", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2021-28972", }, { cve: "CVE-2021-29264", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29264", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29264", url: "https://www.suse.com/security/cve/CVE-2021-29264", }, { category: "external", summary: "SUSE Bug 1184168 for CVE-2021-29264", url: "https://bugzilla.suse.com/1184168", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2021-29264", }, { cve: "CVE-2021-29265", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29265", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29265", url: "https://www.suse.com/security/cve/CVE-2021-29265", }, { category: "external", summary: "SUSE Bug 1184167 for CVE-2021-29265", url: "https://bugzilla.suse.com/1184167", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2021-29265", }, { cve: "CVE-2021-29647", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29647", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29647", url: "https://www.suse.com/security/cve/CVE-2021-29647", }, { category: "external", summary: "SUSE Bug 1184192 for CVE-2021-29647", url: "https://bugzilla.suse.com/1184192", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2021-29647", }, { cve: "CVE-2021-3428", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3428", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3428", url: "https://www.suse.com/security/cve/CVE-2021-3428", }, { category: "external", summary: "SUSE Bug 1173485 for CVE-2021-3428", url: "https://bugzilla.suse.com/1173485", }, { category: "external", summary: "SUSE Bug 1183509 for CVE-2021-3428", url: "https://bugzilla.suse.com/1183509", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "low", }, ], title: "CVE-2021-3428", }, { cve: "CVE-2021-3444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3444", }, ], notes: [ { category: "general", text: "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3444", url: "https://www.suse.com/security/cve/CVE-2021-3444", }, { category: "external", summary: "SUSE Bug 1184170 for CVE-2021-3444", url: "https://bugzilla.suse.com/1184170", }, { category: "external", summary: "SUSE Bug 1184171 for CVE-2021-3444", url: "https://bugzilla.suse.com/1184171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:00Z", details: "moderate", }, ], title: "CVE-2021-3444", }, ], }
suse-su-2021:1176-1
Vulnerability from csaf_suse
Published
2021-04-13 15:46
Modified
2021-04-13 15:46
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).
- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access
because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).
- CVE-2020-0433: Fixed a use after free due to improper locking which could have led to local escalation of privilege (bsc#1176720).
- CVE-2020-27673: Fixed a potential denial of service at high rate of events to dom0, aka CID-e99502f76271 (bsc#1177411 ).
The following non-security bugs were fixed:
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- bfq: Fix kABI for update internal depth state when queue depth changes (bsc#1172455).
- bfq: update internal depth state when queue depth changes (bsc#1172455).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf: fix subprog verifier bypass by div/mod by 0 exception (bsc#1184170).
- bpf: fix x64 JIT code generation for jmp to 1st insn (bsc#1178163).
- bpf_lru_list: Read double-checked variable once without lock (git-fixes).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1179755).
- cifs: fix nodfs mount option (bsc#1179755).
- cifs: introduce helper for finding referral server (bsc#1179755).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (bsc#1104270).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if (bsc#1129770) Backporting notes: * context changes
- drm/atomic: Create __drm_atomic_helper_crtc_reset() for subclassing (bsc#1142635) Backporting notes: * taken for 427c4a0680a2 ('drm/vc4: crtc: Rework a bit the CRTC state code') * renamed drm_atomic_state_helper.{c,h} to drm_atomic_helper.{c,h} * context changes
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1129770) Backporting notes: * context changes
- drm/compat: Clear bounce structures (bsc#1129770) Backporting notes: * context changes
- drm/etnaviv: replace MMU flush marker with flush sequence (bsc#1154048) Backporting notes: * context changes
- drm/gma500: Fix error return code in psb_driver_load() (bsc#1129770)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152446) Backporting notes: * context changes
- drm/mediatek: Fix aal size config (bsc#1129770) Backporting notes: * access I/O memory with writel()
- drm: meson_drv add shutdown function (git-fixes).
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (bsc#1129770)
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm: mxsfb: check framebuffer pitch (bsc#1129770) Backporting notes: * context changes
- drm/omap: fix max fclk divider for omap36xx (bsc#1152446)
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1129770)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1129770) Backporting notes: * context changes
- drm/radeon: fix AGP dependency (git-fixes).
- drm: rcar-du: Put reference to VSP device (bsc#1129770) Backporting notes: * context changes
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1129770) Backporting notes: * context changes
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1129770) Backporting notes: * context changes
- ethernet: alx: fix order of calls on resume (git-fixes).
- fbdev: aty: SPARC64 requires FB_ATY_CT (bsc#1129770)
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- futex: Prevent robust futex exit race (git-fixes).
- gma500: clean up error handling in init (bsc#1129770)
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i40e: Add zero-initialization of AQ command structures (bsc#1109837 bsc#1111981).
- i40e: Fix add TC filter for IPv6 (bsc#1109837 bsc#1111981 ).
- i40e: Fix endianness conversions (bsc#1109837 bsc#1111981 ).
- IB/mlx5: Return appropriate error code instead of ENOMEM (bsc#1103991).
- ibmvnic: add comments for spinlock_t definitions (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).
- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
- ibmvnic: avoid multiple line dereference (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Do not replenish RX buffers after every polling loop (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: fix block comments (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (bsc#1184114 ltc#192237).
- ibmvnic: Fix TX completion error handling (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: prefer strscpy over strlcpy (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: reduce wait for completion time (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: remove excessive irqsave (bsc#1065729).
- ibmvnic: remove never executed if statement (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- ibmvnic: send_login should check for crq errors (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: simplify reset_long_term_buff function (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).
- ibmvnic: track pending login (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- ice: Account for port VLAN in VF max packet size calculation (bsc#1118661).
- igc: check return value of ret_val in igc_config_fc_after_link_up (bsc#1118657).
- igc: Report speed and duplex as unknown when device is runtime suspended (jsc#SLE-4799).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (bsc#1118657).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: raydium_ts_i2c - do not send zero length (git-fixes).
- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183378).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183379).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183380).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183381).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (bsc#1113994).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kabi/severities: Add rtas_online_cpus_mask, rtas_offline_cpus_mask
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183382).
- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE.
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- net: bridge: use switchdev for port flags set through sysfs too (bsc#1112374).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: core: introduce __netdev_notify_peers (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- net: hns3: add a check for index in hclge_get_rss_key() (bsc#1126390).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (bsc#1104353).
- net: hns3: fix bug when calculating the TCAM table info (bsc#1104353).
- net: hns3: fix query vlan mask value error for flow director (bsc#1104353).
- net/mlx5e: Update max_opened_tc also when channels are closed (bsc#1103990).
- net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8081 (bsc#1119113).
- net: re-solve some conflicts after net -> net-next merge (bsc#1184114 ltc#192237 bsc#1176855 ltc#187293).
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Align checking of syscall user config accessors (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc: Convert to using %pOFn instead of device_node.name (bsc#1181674 ltc#189159).
- powerpc: Fix some spelling mistakes (bsc#1181674 ltc#189159).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/numa: Suppress 'VPHN is not supported' messages (bsc#1181674 ltc#189159).
- powerpc/pseries: Add empty update_numa_cpu_lookup_table() for NUMA=n (bsc#1181674 ltc#189159).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries: Generalize hcall_vphn() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- powerpc/rtas: Unexport rtas_online_cpus_mask, rtas_offline_cpus_mask (bsc#1181674 ltc#189159).
- powerpc/vio: Use device_type to detect family (bsc#1181674 ltc#189159).
- printk: fix deadlock when kernel panic (bsc#1183018).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- random: fix the RNDRESEEDCRNG ioctl (git-fixes).
- rcu: Allow only one expedited GP to run concurrently with (git-fixes)
- rcu: Fix missed wakeup of exp_wq waiters (git-fixes)
- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (bsc#1103991).
- RDMA/rxe: Remove useless code in rxe_recv.c (bsc#1103992 ).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- RDMA/uverbs: Fix kernel-doc warning of _uverbs_alloc (bsc#1103992).
- Revert 'ibmvnic: remove never executed if statement' (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).
- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).
- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).
- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).
- s390/vtime: fix increased steal time accounting (bsc#1183861).
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/vtime: Fix guest/system mis-accounting on task switch (git-fixes)
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix ancient double free (bsc#1182574).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1182574).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix kerneldoc inconsistency in lpfc_sli4_dump_page_a0() (bsc#1182574).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix 'physical' typos (bsc#1182574).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- selinux: never allow relabeling on context mounts (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).
- USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- USBip: Fix unsafe unaligned pointer usage (git-fixes).
- USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- USBip: tools: fix build error for multiple definition (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-commit).
- use __netdev_notify_peers in ibmvnic (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1129770)
- video: fbdev: atmel_lcdfb: fix return error code in (bsc#1129770) Backporting notes: * context changes * fallout from trailing whitespaces
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).
- xsk: Remove dangling function declaration from header file (bsc#1109837).
Patchnames
SUSE-2021-1176,SUSE-SLE-RT-12-SP5-2021-1176
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).\n- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).\n- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).\n- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).\n- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).\n- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).\n- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).\n- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).\n- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).\n- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).\n- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).\n- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).\n- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).\n- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).\n- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).\n- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).\n- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).\n- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).\n- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).\n- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).\n- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access \n because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).\n- CVE-2020-0433: Fixed a use after free due to improper locking which could have led to local escalation of privilege (bsc#1176720).\n- CVE-2020-27673: Fixed a potential denial of service at high rate of events to dom0, aka CID-e99502f76271 (bsc#1177411 ).\n\nThe following non-security bugs were fixed:\n\n- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).\n- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).\n- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).\n- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).\n- amba: Fix resource leak for drivers without .remove (git-fixes).\n- bfq: Fix kABI for update internal depth state when queue depth changes (bsc#1172455).\n- bfq: update internal depth state when queue depth changes (bsc#1172455).\n- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).\n- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).\n- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).\n- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).\n- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).\n- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).\n- bpf: fix subprog verifier bypass by div/mod by 0 exception (bsc#1184170).\n- bpf: fix x64 JIT code generation for jmp to 1st insn (bsc#1178163).\n- bpf_lru_list: Read double-checked variable once without lock (git-fixes).\n- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).\n- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).\n- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).\n- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).\n- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).\n- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).\n- can: peak_usb: add forgotten supported devices (git-fixes).\n- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).\n- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).\n- cifs: check all path components in resolved dfs target (bsc#1179755).\n- cifs: fix nodfs mount option (bsc#1179755).\n- cifs: introduce helper for finding referral server (bsc#1179755).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (bsc#1104270).\n- dmaengine: hsu: disable spurious interrupt (git-fixes).\n- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if (bsc#1129770) Backporting notes: \t* context changes\n- drm/atomic: Create __drm_atomic_helper_crtc_reset() for subclassing (bsc#1142635) Backporting notes: \t* taken for 427c4a0680a2 ('drm/vc4: crtc: Rework a bit the CRTC state code') \t* renamed drm_atomic_state_helper.{c,h} to drm_atomic_helper.{c,h} \t* context changes\n- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1129770) Backporting notes: \t* context changes\n- drm/compat: Clear bounce structures (bsc#1129770) Backporting notes: \t* context changes\n- drm/etnaviv: replace MMU flush marker with flush sequence (bsc#1154048) Backporting notes: \t* context changes\n- drm/gma500: Fix error return code in psb_driver_load() (bsc#1129770)\n- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152446) Backporting notes: \t* context changes\n- drm/mediatek: Fix aal size config (bsc#1129770) Backporting notes: \t* access I/O memory with writel()\n- drm: meson_drv add shutdown function (git-fixes).\n- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).\n- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (bsc#1129770)\n- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).\n- drm: mxsfb: check framebuffer pitch (bsc#1129770) Backporting notes: \t* context changes\n- drm/omap: fix max fclk divider for omap36xx (bsc#1152446)\n- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1129770)\n- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1129770) Backporting notes: \t* context changes\n- drm/radeon: fix AGP dependency (git-fixes).\n- drm: rcar-du: Put reference to VSP device (bsc#1129770) Backporting notes: \t* context changes\n- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1129770) Backporting notes: \t* context changes\n- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1129770) Backporting notes: \t* context changes\n- ethernet: alx: fix order of calls on resume (git-fixes).\n- fbdev: aty: SPARC64 requires FB_ATY_CT (bsc#1129770)\n- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).\n- futex: Prevent robust futex exit race (git-fixes).\n- gma500: clean up error handling in init (bsc#1129770)\n- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).\n- HID: make arrays usage and value to be the same (git-fixes).\n- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).\n- i40e: Add zero-initialization of AQ command structures (bsc#1109837 bsc#1111981).\n- i40e: Fix add TC filter for IPv6 (bsc#1109837 bsc#1111981 ).\n- i40e: Fix endianness conversions (bsc#1109837 bsc#1111981 ).\n- IB/mlx5: Return appropriate error code instead of ENOMEM (bsc#1103991).\n- ibmvnic: add comments for spinlock_t definitions (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: add memory barrier to protect long term buffer (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).\n- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).\n- ibmvnic: avoid multiple line dereference (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: create send_control_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: create send_query_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Do not replenish RX buffers after every polling loop (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).\n- ibmvnic: Ensure that device queue memory is cache-line aligned (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: fix block comments (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: fix braces (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: fix miscellaneous checks (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (bsc#1184114 ltc#192237).\n- ibmvnic: Fix TX completion error handling (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Fix use-after-free of VNIC login response buffer (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: handle inconsistent login with reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Harden device Command Response Queue handshake (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: merge do_change_param_reset into do_reset (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: no reset timeout for 5 seconds after reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: prefer strscpy over strlcpy (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: reduce wait for completion time (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: remove excessive irqsave (bsc#1065729).\n- ibmvnic: remove never executed if statement (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_cap_queries to send_query_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_map_query to send_query_map (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- ibmvnic: send_login should check for crq errors (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: simplify reset_long_term_buff function (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).\n- ibmvnic: skip send_request_unmap for timeout reset (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591).\n- ibmvnic: skip tx timeout reset while in resetting (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: stop free_all_rwi on failed reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1184114 ltc#192237 bsc#1183023 ltc#191791).\n- ibmvnic: track pending login (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- ice: Account for port VLAN in VF max packet size calculation (bsc#1118661).\n- igc: check return value of ret_val in igc_config_fc_after_link_up (bsc#1118657).\n- igc: Report speed and duplex as unknown when device is runtime suspended (jsc#SLE-4799).\n- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (bsc#1118657).\n- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).\n- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).\n- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).\n- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).\n- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).\n- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).\n- Input: i8042 - unbreak Pegatron C15B (git-fixes).\n- Input: raydium_ts_i2c - do not send zero length (git-fixes).\n- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).\n- Input: xpad - sync supported devices with fork on GitHub (git-fixes).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183378).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183379).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183380).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183381).\n- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (bsc#1113994).\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kabi/severities: Add rtas_online_cpus_mask, rtas_offline_cpus_mask\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: add more data to CSD lock debugging (bsc#1180846).\n- kernel/smp: prepare more CSD lock debugging (bsc#1180846).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183382).\n- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).\n- mac80211: fix double free in ibss_leave (git-fixes).\n- mac80211: fix rate mask reset (git-fixes).\n- media: usbtv: Fix deadlock on suspend (git-fixes).\n- media: uvcvideo: Allow entities with no pads (git-fixes).\n- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).\n- mmc: core: Fix partition switch time for eMMC (git-fixes).\n- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE.\n- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).\n- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).\n- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).\n- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).\n- net: bridge: use switchdev for port flags set through sysfs too (bsc#1112374).\n- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).\n- net: core: introduce __netdev_notify_peers (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- net: hns3: add a check for index in hclge_get_rss_key() (bsc#1126390).\n- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (bsc#1104353).\n- net: hns3: fix bug when calculating the TCAM table info (bsc#1104353).\n- net: hns3: fix query vlan mask value error for flow director (bsc#1104353).\n- net/mlx5e: Update max_opened_tc also when channels are closed (bsc#1103990).\n- net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8081 (bsc#1119113).\n- net: re-solve some conflicts after net -> net-next merge (bsc#1184114 ltc#192237 bsc#1176855 ltc#187293).\n- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).\n- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).\n- PCI: Align checking of syscall user config accessors (git-fixes).\n- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).\n- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).\n- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).\n- powerpc: Convert to using %pOFn instead of device_node.name (bsc#1181674 ltc#189159).\n- powerpc: Fix some spelling mistakes (bsc#1181674 ltc#189159).\n- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).\n- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).\n- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).\n- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).\n- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).\n- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).\n- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).\n- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).\n- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).\n- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).\n- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).\n- powerpc/numa: Suppress 'VPHN is not supported' messages (bsc#1181674 ltc#189159).\n- powerpc/pseries: Add empty update_numa_cpu_lookup_table() for NUMA=n (bsc#1181674 ltc#189159).\n- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).\n- powerpc/pseries: Generalize hcall_vphn() (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).\n- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).\n- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).\n- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).\n- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).\n- powerpc/rtas: Unexport rtas_online_cpus_mask, rtas_offline_cpus_mask (bsc#1181674 ltc#189159).\n- powerpc/vio: Use device_type to detect family (bsc#1181674 ltc#189159).\n- printk: fix deadlock when kernel panic (bsc#1183018).\n- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).\n- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).\n- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).\n- qxl: Fix uninitialised struct field head.surface_id (git-fixes).\n- random: fix the RNDRESEEDCRNG ioctl (git-fixes).\n- rcu: Allow only one expedited GP to run concurrently with (git-fixes)\n- rcu: Fix missed wakeup of exp_wq waiters (git-fixes)\n- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (bsc#1103991).\n- RDMA/rxe: Remove useless code in rxe_recv.c (bsc#1103992 ).\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/uverbs: Fix kernel-doc warning of _uverbs_alloc (bsc#1103992).\n- Revert 'ibmvnic: remove never executed if statement' (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290).\n- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).\n- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).\n- s390/dasd: fix hanging offline processing due to canceled worker (bsc#1175165).\n- s390/vtime: fix increased steal time accounting (bsc#1183861).\n- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)\n- sched/vtime: Fix guest/system mis-accounting on task switch (git-fixes)\n- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).\n- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).\n- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).\n- scsi: lpfc: Fix ancient double free (bsc#1182574).\n- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).\n- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).\n- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1182574).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).\n- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).\n- scsi: lpfc: Fix kerneldoc inconsistency in lpfc_sli4_dump_page_a0() (bsc#1182574).\n- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).\n- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).\n- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).\n- scsi: lpfc: Fix 'physical' typos (bsc#1182574).\n- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).\n- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).\n- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).\n- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).\n- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).\n- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).\n- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).\n- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).\n- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).\n- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).\n- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).\n- selinux: never allow relabeling on context mounts (git-fixes).\n- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).\n- Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).\n- USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).\n- USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).\n- USBip: Fix unsafe unaligned pointer usage (git-fixes).\n- USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).\n- USBip: tools: fix build error for multiple definition (git-fixes).\n- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).\n- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).\n- USB: serial: option: add Quectel EM160R-GL (git-fixes).\n- USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).\n- USB: usblp: do not call usb_set_interface if there's a single alt (git-commit).\n- use __netdev_notify_peers in ibmvnic (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139).\n- video: fbdev: acornfb: remove free_unused_pages() (bsc#1129770)\n- video: fbdev: atmel_lcdfb: fix return error code in (bsc#1129770) Backporting notes: \t* context changes \t* fallout from trailing whitespaces\n- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).\n- xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).\n- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).\n- xsk: Remove dangling function declaration from header file (bsc#1109837).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-1176,SUSE-SLE-RT-12-SP5-2021-1176", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1176-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:1176-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20211176-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:1176-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103991", url: "https://bugzilla.suse.com/1103991", }, { category: "self", summary: "SUSE Bug 1103992", url: "https://bugzilla.suse.com/1103992", }, { category: "self", summary: "SUSE Bug 1104270", url: "https://bugzilla.suse.com/1104270", }, { category: "self", summary: "SUSE Bug 1104353", url: "https://bugzilla.suse.com/1104353", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1111981", url: "https://bugzilla.suse.com/1111981", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1113994", url: "https://bugzilla.suse.com/1113994", }, { category: "self", summary: "SUSE Bug 1118657", url: "https://bugzilla.suse.com/1118657", }, { category: "self", summary: "SUSE Bug 1118661", url: "https://bugzilla.suse.com/1118661", }, { category: "self", summary: "SUSE Bug 1119113", url: "https://bugzilla.suse.com/1119113", }, { category: "self", summary: "SUSE Bug 1126390", url: "https://bugzilla.suse.com/1126390", }, { category: "self", summary: "SUSE Bug 1129770", url: "https://bugzilla.suse.com/1129770", }, { category: "self", summary: "SUSE Bug 1132477", url: "https://bugzilla.suse.com/1132477", }, { category: "self", summary: "SUSE Bug 1142635", url: "https://bugzilla.suse.com/1142635", }, { category: "self", summary: "SUSE Bug 1152446", url: "https://bugzilla.suse.com/1152446", }, { category: "self", summary: "SUSE Bug 1154048", url: "https://bugzilla.suse.com/1154048", }, { category: "self", summary: "SUSE Bug 1169709", url: "https://bugzilla.suse.com/1169709", }, { category: "self", summary: "SUSE Bug 1172455", url: "https://bugzilla.suse.com/1172455", }, { category: "self", summary: "SUSE Bug 1173485", url: "https://bugzilla.suse.com/1173485", }, { category: "self", summary: "SUSE Bug 1175165", url: "https://bugzilla.suse.com/1175165", }, { category: "self", summary: "SUSE Bug 1176720", url: "https://bugzilla.suse.com/1176720", }, { category: "self", summary: "SUSE Bug 1176855", url: "https://bugzilla.suse.com/1176855", }, { category: "self", summary: "SUSE Bug 1177411", url: "https://bugzilla.suse.com/1177411", }, { category: "self", summary: "SUSE Bug 1178163", url: "https://bugzilla.suse.com/1178163", }, { category: "self", summary: "SUSE Bug 1179243", url: "https://bugzilla.suse.com/1179243", }, { category: "self", summary: "SUSE Bug 1179428", url: "https://bugzilla.suse.com/1179428", }, { category: "self", summary: "SUSE Bug 1179454", url: "https://bugzilla.suse.com/1179454", }, { category: "self", summary: "SUSE Bug 1179660", url: "https://bugzilla.suse.com/1179660", }, { category: "self", summary: "SUSE Bug 1179755", url: "https://bugzilla.suse.com/1179755", }, { category: "self", summary: "SUSE Bug 1180846", url: "https://bugzilla.suse.com/1180846", }, { category: "self", summary: "SUSE Bug 1181515", url: "https://bugzilla.suse.com/1181515", }, { category: "self", summary: "SUSE Bug 1181544", url: "https://bugzilla.suse.com/1181544", }, { category: "self", summary: "SUSE Bug 1181655", url: "https://bugzilla.suse.com/1181655", }, { category: "self", summary: "SUSE Bug 1181674", url: "https://bugzilla.suse.com/1181674", }, { category: "self", summary: "SUSE Bug 1181747", url: "https://bugzilla.suse.com/1181747", }, { category: "self", summary: "SUSE Bug 1181753", url: "https://bugzilla.suse.com/1181753", }, { category: "self", summary: "SUSE Bug 1181843", url: "https://bugzilla.suse.com/1181843", }, { category: "self", summary: "SUSE Bug 1182011", url: "https://bugzilla.suse.com/1182011", }, { category: "self", summary: "SUSE Bug 1182175", url: "https://bugzilla.suse.com/1182175", }, { category: "self", summary: "SUSE Bug 1182485", url: "https://bugzilla.suse.com/1182485", }, { category: "self", summary: "SUSE Bug 1182574", url: "https://bugzilla.suse.com/1182574", }, { category: "self", summary: "SUSE Bug 1182715", url: "https://bugzilla.suse.com/1182715", }, { category: "self", summary: "SUSE Bug 1182716", url: "https://bugzilla.suse.com/1182716", }, { category: "self", summary: "SUSE Bug 1182717", url: "https://bugzilla.suse.com/1182717", }, { category: "self", summary: "SUSE Bug 1183018", url: "https://bugzilla.suse.com/1183018", }, { category: "self", summary: "SUSE Bug 1183022", url: "https://bugzilla.suse.com/1183022", }, { category: "self", summary: "SUSE Bug 1183023", url: "https://bugzilla.suse.com/1183023", }, { category: "self", summary: "SUSE Bug 1183378", url: "https://bugzilla.suse.com/1183378", }, { category: "self", summary: "SUSE Bug 1183379", url: "https://bugzilla.suse.com/1183379", }, { category: "self", summary: "SUSE Bug 1183380", url: "https://bugzilla.suse.com/1183380", }, { category: "self", summary: "SUSE Bug 1183381", url: "https://bugzilla.suse.com/1183381", }, { category: "self", summary: "SUSE Bug 1183382", url: "https://bugzilla.suse.com/1183382", }, { category: "self", summary: "SUSE Bug 1183416", url: "https://bugzilla.suse.com/1183416", }, { category: "self", summary: "SUSE Bug 1183509", url: "https://bugzilla.suse.com/1183509", }, { category: "self", summary: "SUSE Bug 1183593", url: "https://bugzilla.suse.com/1183593", }, { category: "self", summary: "SUSE Bug 1183646", url: "https://bugzilla.suse.com/1183646", }, { category: "self", summary: "SUSE Bug 1183686", url: "https://bugzilla.suse.com/1183686", }, { category: "self", summary: "SUSE Bug 1183692", url: "https://bugzilla.suse.com/1183692", }, { category: "self", summary: "SUSE Bug 1183696", url: "https://bugzilla.suse.com/1183696", }, { category: "self", summary: "SUSE Bug 1183775", url: "https://bugzilla.suse.com/1183775", }, { category: "self", summary: "SUSE Bug 1183861", url: "https://bugzilla.suse.com/1183861", }, { category: "self", summary: "SUSE Bug 1183871", url: "https://bugzilla.suse.com/1183871", }, { category: "self", summary: "SUSE Bug 1184114", url: "https://bugzilla.suse.com/1184114", }, { category: "self", summary: "SUSE Bug 1184167", url: "https://bugzilla.suse.com/1184167", }, { category: "self", summary: "SUSE Bug 1184168", url: "https://bugzilla.suse.com/1184168", }, { category: "self", summary: "SUSE Bug 1184170", url: "https://bugzilla.suse.com/1184170", }, { category: "self", summary: "SUSE Bug 1184192", url: "https://bugzilla.suse.com/1184192", }, { category: "self", summary: "SUSE Bug 1184193", url: "https://bugzilla.suse.com/1184193", }, { category: "self", summary: "SUSE Bug 1184196", url: "https://bugzilla.suse.com/1184196", }, { category: "self", summary: "SUSE Bug 1184198", url: "https://bugzilla.suse.com/1184198", }, { category: "self", summary: "SUSE CVE CVE-2020-0433 page", url: "https://www.suse.com/security/cve/CVE-2020-0433/", }, { category: "self", summary: "SUSE CVE CVE-2020-27170 page", url: "https://www.suse.com/security/cve/CVE-2020-27170/", }, { category: "self", summary: "SUSE CVE CVE-2020-27171 page", url: "https://www.suse.com/security/cve/CVE-2020-27171/", }, { category: "self", summary: "SUSE CVE CVE-2020-27673 page", url: "https://www.suse.com/security/cve/CVE-2020-27673/", }, { category: "self", summary: "SUSE CVE CVE-2020-27815 page", url: "https://www.suse.com/security/cve/CVE-2020-27815/", }, { category: "self", summary: "SUSE CVE CVE-2020-29368 page", url: "https://www.suse.com/security/cve/CVE-2020-29368/", }, { category: "self", summary: "SUSE CVE CVE-2020-29374 page", url: "https://www.suse.com/security/cve/CVE-2020-29374/", }, { category: "self", summary: "SUSE CVE CVE-2020-35519 page", url: "https://www.suse.com/security/cve/CVE-2020-35519/", }, { category: "self", summary: "SUSE CVE CVE-2021-26930 page", url: "https://www.suse.com/security/cve/CVE-2021-26930/", }, { category: "self", summary: "SUSE CVE CVE-2021-26931 page", url: "https://www.suse.com/security/cve/CVE-2021-26931/", }, { category: "self", summary: "SUSE CVE CVE-2021-26932 page", url: "https://www.suse.com/security/cve/CVE-2021-26932/", }, { category: "self", summary: "SUSE CVE CVE-2021-27363 page", url: "https://www.suse.com/security/cve/CVE-2021-27363/", }, { category: "self", summary: "SUSE CVE CVE-2021-27364 page", url: "https://www.suse.com/security/cve/CVE-2021-27364/", }, { category: "self", summary: "SUSE CVE CVE-2021-27365 page", url: "https://www.suse.com/security/cve/CVE-2021-27365/", }, { category: "self", summary: "SUSE CVE CVE-2021-28038 page", url: "https://www.suse.com/security/cve/CVE-2021-28038/", }, { category: "self", summary: "SUSE CVE CVE-2021-28660 page", url: "https://www.suse.com/security/cve/CVE-2021-28660/", }, { category: "self", summary: "SUSE CVE CVE-2021-28688 page", url: "https://www.suse.com/security/cve/CVE-2021-28688/", }, { category: "self", summary: "SUSE CVE CVE-2021-28964 page", url: "https://www.suse.com/security/cve/CVE-2021-28964/", }, { category: "self", summary: "SUSE CVE CVE-2021-28971 page", url: "https://www.suse.com/security/cve/CVE-2021-28971/", }, { category: "self", summary: "SUSE CVE CVE-2021-28972 page", url: "https://www.suse.com/security/cve/CVE-2021-28972/", }, { category: "self", summary: "SUSE CVE CVE-2021-29264 page", url: "https://www.suse.com/security/cve/CVE-2021-29264/", }, { category: "self", summary: "SUSE CVE CVE-2021-29265 page", url: "https://www.suse.com/security/cve/CVE-2021-29265/", }, { category: "self", summary: "SUSE CVE CVE-2021-29647 page", url: "https://www.suse.com/security/cve/CVE-2021-29647/", }, { category: "self", summary: "SUSE CVE CVE-2021-3428 page", url: "https://www.suse.com/security/cve/CVE-2021-3428/", }, { category: "self", summary: "SUSE CVE CVE-2021-3444 page", url: "https://www.suse.com/security/cve/CVE-2021-3444/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-04-13T15:46:15Z", generator: { date: "2021-04-13T15:46:15Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:1176-1", initial_release_date: "2021-04-13T15:46:15Z", revision_history: [ { date: "2021-04-13T15:46:15Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-4.12.14-10.37.1.noarch", product: { name: "kernel-devel-rt-4.12.14-10.37.1.noarch", product_id: "kernel-devel-rt-4.12.14-10.37.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-4.12.14-10.37.1.noarch", product: { name: "kernel-source-rt-4.12.14-10.37.1.noarch", product_id: "kernel-source-rt-4.12.14-10.37.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", product: { name: "cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", product_id: "cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-4.12.14-10.37.1.x86_64", product: { name: "cluster-md-kmp-rt_debug-4.12.14-10.37.1.x86_64", product_id: "cluster-md-kmp-rt_debug-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-4.12.14-10.37.1.x86_64", product: { name: "dlm-kmp-rt-4.12.14-10.37.1.x86_64", product_id: "dlm-kmp-rt-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-4.12.14-10.37.1.x86_64", product: { name: "dlm-kmp-rt_debug-4.12.14-10.37.1.x86_64", product_id: "dlm-kmp-rt_debug-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-4.12.14-10.37.1.x86_64", product: { name: "gfs2-kmp-rt-4.12.14-10.37.1.x86_64", product_id: "gfs2-kmp-rt-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-4.12.14-10.37.1.x86_64", product: { name: "gfs2-kmp-rt_debug-4.12.14-10.37.1.x86_64", product_id: "gfs2-kmp-rt_debug-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-4.12.14-10.37.1.x86_64", product: { name: "kernel-rt-4.12.14-10.37.1.x86_64", product_id: "kernel-rt-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-base-4.12.14-10.37.1.x86_64", product: { name: "kernel-rt-base-4.12.14-10.37.1.x86_64", product_id: "kernel-rt-base-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-4.12.14-10.37.1.x86_64", product: { name: "kernel-rt-devel-4.12.14-10.37.1.x86_64", product_id: "kernel-rt-devel-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-4.12.14-10.37.1.x86_64", product: { name: "kernel-rt-extra-4.12.14-10.37.1.x86_64", product_id: "kernel-rt-extra-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-kgraft-devel-4.12.14-10.37.1.x86_64", product: { name: "kernel-rt-kgraft-devel-4.12.14-10.37.1.x86_64", product_id: "kernel-rt-kgraft-devel-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-4.12.14-10.37.1.x86_64", product: { name: "kernel-rt_debug-4.12.14-10.37.1.x86_64", product_id: "kernel-rt_debug-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-base-4.12.14-10.37.1.x86_64", product: { name: "kernel-rt_debug-base-4.12.14-10.37.1.x86_64", product_id: "kernel-rt_debug-base-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", product: { name: "kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", product_id: "kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-4.12.14-10.37.1.x86_64", product: { name: "kernel-rt_debug-extra-4.12.14-10.37.1.x86_64", product_id: "kernel-rt_debug-extra-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-kgraft-devel-4.12.14-10.37.1.x86_64", product: { name: "kernel-rt_debug-kgraft-devel-4.12.14-10.37.1.x86_64", product_id: "kernel-rt_debug-kgraft-devel-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-4.12.14-10.37.1.x86_64", product: { name: "kernel-syms-rt-4.12.14-10.37.1.x86_64", product_id: "kernel-syms-rt-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-4.12.14-10.37.1.x86_64", product: { name: "kselftests-kmp-rt-4.12.14-10.37.1.x86_64", product_id: "kselftests-kmp-rt-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-4.12.14-10.37.1.x86_64", product: { name: "kselftests-kmp-rt_debug-4.12.14-10.37.1.x86_64", product_id: "kselftests-kmp-rt_debug-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", product: { name: "ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", product_id: "ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-4.12.14-10.37.1.x86_64", product: { name: "ocfs2-kmp-rt_debug-4.12.14-10.37.1.x86_64", product_id: "ocfs2-kmp-rt_debug-4.12.14-10.37.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Real Time 12 SP5", product: { name: "SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-4.12.14-10.37.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", }, product_reference: "cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-4.12.14-10.37.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", }, product_reference: "dlm-kmp-rt-4.12.14-10.37.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-4.12.14-10.37.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", }, product_reference: "gfs2-kmp-rt-4.12.14-10.37.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-4.12.14-10.37.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", }, product_reference: "kernel-devel-rt-4.12.14-10.37.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-4.12.14-10.37.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", }, product_reference: "kernel-rt-4.12.14-10.37.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-base-4.12.14-10.37.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", }, product_reference: "kernel-rt-base-4.12.14-10.37.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-4.12.14-10.37.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", }, product_reference: "kernel-rt-devel-4.12.14-10.37.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-4.12.14-10.37.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", }, product_reference: "kernel-rt_debug-4.12.14-10.37.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-4.12.14-10.37.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", }, product_reference: "kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-4.12.14-10.37.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", }, product_reference: "kernel-source-rt-4.12.14-10.37.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-4.12.14-10.37.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", }, product_reference: "kernel-syms-rt-4.12.14-10.37.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-4.12.14-10.37.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", }, product_reference: "ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2020-0433", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0433", }, ], notes: [ { category: "general", text: "In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151939299", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0433", url: "https://www.suse.com/security/cve/CVE-2020-0433", }, { category: "external", summary: "SUSE Bug 1176720 for CVE-2020-0433", url: "https://bugzilla.suse.com/1176720", }, { category: "external", summary: "SUSE Bug 1178066 for CVE-2020-0433", url: "https://bugzilla.suse.com/1178066", }, { category: "external", summary: "SUSE Bug 1187135 for CVE-2020-0433", url: "https://bugzilla.suse.com/1187135", }, { category: "external", summary: "SUSE Bug 1189302 for CVE-2020-0433", url: "https://bugzilla.suse.com/1189302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "important", }, ], title: "CVE-2020-0433", }, { cve: "CVE-2020-27170", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27170", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27170", url: "https://www.suse.com/security/cve/CVE-2020-27170", }, { category: "external", summary: "SUSE Bug 1183686 for CVE-2020-27170", url: "https://bugzilla.suse.com/1183686", }, { category: "external", summary: "SUSE Bug 1183775 for CVE-2020-27170", url: "https://bugzilla.suse.com/1183775", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2020-27170", }, { cve: "CVE-2020-27171", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27171", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27171", url: "https://www.suse.com/security/cve/CVE-2020-27171", }, { category: "external", summary: "SUSE Bug 1183686 for CVE-2020-27171", url: "https://bugzilla.suse.com/1183686", }, { category: "external", summary: "SUSE Bug 1183775 for CVE-2020-27171", url: "https://bugzilla.suse.com/1183775", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2020-27171", }, { cve: "CVE-2020-27673", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27673", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27673", url: "https://www.suse.com/security/cve/CVE-2020-27673", }, { category: "external", summary: "SUSE Bug 1177411 for CVE-2020-27673", url: "https://bugzilla.suse.com/1177411", }, { category: "external", summary: "SUSE Bug 1184583 for CVE-2020-27673", url: "https://bugzilla.suse.com/1184583", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2020-27673", }, { cve: "CVE-2020-27815", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27815", }, ], notes: [ { category: "general", text: "A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27815", url: "https://www.suse.com/security/cve/CVE-2020-27815", }, { category: "external", summary: "SUSE Bug 1179454 for CVE-2020-27815", url: "https://bugzilla.suse.com/1179454", }, { category: "external", summary: "SUSE Bug 1179458 for CVE-2020-27815", url: "https://bugzilla.suse.com/1179458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "important", }, ], title: "CVE-2020-27815", }, { cve: "CVE-2020-29368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29368", }, ], notes: [ { category: "general", text: "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29368", url: "https://www.suse.com/security/cve/CVE-2020-29368", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179660", }, { category: "external", summary: "SUSE Bug 1179664 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2020-29368", }, { cve: "CVE-2020-29374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29374", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29374", url: "https://www.suse.com/security/cve/CVE-2020-29374", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "low", }, ], title: "CVE-2020-29374", }, { cve: "CVE-2020-35519", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-35519", }, ], notes: [ { category: "general", text: "An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-35519", url: "https://www.suse.com/security/cve/CVE-2020-35519", }, { category: "external", summary: "SUSE Bug 1183696 for CVE-2020-35519", url: "https://bugzilla.suse.com/1183696", }, { category: "external", summary: "SUSE Bug 1184953 for CVE-2020-35519", url: "https://bugzilla.suse.com/1184953", }, { category: "external", summary: "SUSE Bug 1211495 for CVE-2020-35519", url: "https://bugzilla.suse.com/1211495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "important", }, ], title: "CVE-2020-35519", }, { cve: "CVE-2021-26930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26930", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26930", url: "https://www.suse.com/security/cve/CVE-2021-26930", }, { category: "external", summary: "SUSE Bug 1181843 for CVE-2021-26930", url: "https://bugzilla.suse.com/1181843", }, { category: "external", summary: "SUSE Bug 1182294 for CVE-2021-26930", url: "https://bugzilla.suse.com/1182294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "important", }, ], title: "CVE-2021-26930", }, { cve: "CVE-2021-26931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26931", url: "https://www.suse.com/security/cve/CVE-2021-26931", }, { category: "external", summary: "SUSE Bug 1181753 for CVE-2021-26931", url: "https://bugzilla.suse.com/1181753", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-26931", url: "https://bugzilla.suse.com/1183022", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2021-26931", }, { cve: "CVE-2021-26932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26932", url: "https://www.suse.com/security/cve/CVE-2021-26932", }, { category: "external", summary: "SUSE Bug 1181747 for CVE-2021-26932", url: "https://bugzilla.suse.com/1181747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2021-26932", }, { cve: "CVE-2021-27363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-27363", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-27363", url: "https://www.suse.com/security/cve/CVE-2021-27363", }, { category: "external", summary: "SUSE Bug 1182716 for CVE-2021-27363", url: "https://bugzilla.suse.com/1182716", }, { category: "external", summary: "SUSE Bug 1182717 for CVE-2021-27363", url: "https://bugzilla.suse.com/1182717", }, { category: "external", summary: "SUSE Bug 1183120 for CVE-2021-27363", url: "https://bugzilla.suse.com/1183120", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-27363", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "important", }, ], title: "CVE-2021-27363", }, { cve: "CVE-2021-27364", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-27364", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-27364", url: "https://www.suse.com/security/cve/CVE-2021-27364", }, { category: "external", summary: "SUSE Bug 1182715 for CVE-2021-27364", url: "https://bugzilla.suse.com/1182715", }, { category: "external", summary: "SUSE Bug 1182716 for CVE-2021-27364", url: "https://bugzilla.suse.com/1182716", }, { category: "external", summary: "SUSE Bug 1182717 for CVE-2021-27364", url: "https://bugzilla.suse.com/1182717", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-27364", url: "https://bugzilla.suse.com/1200084", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2021-27364", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2021-27364", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "important", }, ], title: "CVE-2021-27364", }, { cve: "CVE-2021-27365", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-27365", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-27365", url: "https://www.suse.com/security/cve/CVE-2021-27365", }, { category: "external", summary: "SUSE Bug 1182712 for CVE-2021-27365", url: "https://bugzilla.suse.com/1182712", }, { category: "external", summary: "SUSE Bug 1182715 for CVE-2021-27365", url: "https://bugzilla.suse.com/1182715", }, { category: "external", summary: "SUSE Bug 1183491 for CVE-2021-27365", url: "https://bugzilla.suse.com/1183491", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-27365", url: "https://bugzilla.suse.com/1200084", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2021-27365", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2021-27365", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2021-27365", }, { cve: "CVE-2021-28038", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28038", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28038", url: "https://www.suse.com/security/cve/CVE-2021-28038", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-28038", url: "https://bugzilla.suse.com/1183022", }, { category: "external", summary: "SUSE Bug 1183069 for CVE-2021-28038", url: "https://bugzilla.suse.com/1183069", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2021-28038", }, { cve: "CVE-2021-28660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28660", }, ], notes: [ { category: "general", text: "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the ->ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28660", url: "https://www.suse.com/security/cve/CVE-2021-28660", }, { category: "external", summary: "SUSE Bug 1183593 for CVE-2021-28660", url: "https://bugzilla.suse.com/1183593", }, { category: "external", summary: "SUSE Bug 1183658 for CVE-2021-28660", url: "https://bugzilla.suse.com/1183658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "important", }, ], title: "CVE-2021-28660", }, { cve: "CVE-2021-28688", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28688", }, ], notes: [ { category: "general", text: "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28688", url: "https://www.suse.com/security/cve/CVE-2021-28688", }, { category: "external", summary: "SUSE Bug 1183646 for CVE-2021-28688", url: "https://bugzilla.suse.com/1183646", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2021-28688", }, { cve: "CVE-2021-28964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28964", }, ], notes: [ { category: "general", text: "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28964", url: "https://www.suse.com/security/cve/CVE-2021-28964", }, { category: "external", summary: "SUSE Bug 1184193 for CVE-2021-28964", url: "https://bugzilla.suse.com/1184193", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2021-28964", }, { cve: "CVE-2021-28971", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28971", }, ], notes: [ { category: "general", text: "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28971", url: "https://www.suse.com/security/cve/CVE-2021-28971", }, { category: "external", summary: "SUSE Bug 1184196 for CVE-2021-28971", url: "https://bugzilla.suse.com/1184196", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2021-28971", }, { cve: "CVE-2021-28972", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28972", }, ], notes: [ { category: "general", text: "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\\0' termination, aka CID-cc7a0bb058b8.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28972", url: "https://www.suse.com/security/cve/CVE-2021-28972", }, { category: "external", summary: "SUSE Bug 1184198 for CVE-2021-28972", url: "https://bugzilla.suse.com/1184198", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2021-28972", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2021-28972", }, { cve: "CVE-2021-29264", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29264", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29264", url: "https://www.suse.com/security/cve/CVE-2021-29264", }, { category: "external", summary: "SUSE Bug 1184168 for CVE-2021-29264", url: "https://bugzilla.suse.com/1184168", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2021-29264", }, { cve: "CVE-2021-29265", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29265", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29265", url: "https://www.suse.com/security/cve/CVE-2021-29265", }, { category: "external", summary: "SUSE Bug 1184167 for CVE-2021-29265", url: "https://bugzilla.suse.com/1184167", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2021-29265", }, { cve: "CVE-2021-29647", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-29647", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-29647", url: "https://www.suse.com/security/cve/CVE-2021-29647", }, { category: "external", summary: "SUSE Bug 1184192 for CVE-2021-29647", url: "https://bugzilla.suse.com/1184192", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2021-29647", }, { cve: "CVE-2021-3428", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3428", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3428", url: "https://www.suse.com/security/cve/CVE-2021-3428", }, { category: "external", summary: "SUSE Bug 1173485 for CVE-2021-3428", url: "https://bugzilla.suse.com/1173485", }, { category: "external", summary: "SUSE Bug 1183509 for CVE-2021-3428", url: "https://bugzilla.suse.com/1183509", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "low", }, ], title: "CVE-2021-3428", }, { cve: "CVE-2021-3444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3444", }, ], notes: [ { category: "general", text: "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3444", url: "https://www.suse.com/security/cve/CVE-2021-3444", }, { category: "external", summary: "SUSE Bug 1184170 for CVE-2021-3444", url: "https://bugzilla.suse.com/1184170", }, { category: "external", summary: "SUSE Bug 1184171 for CVE-2021-3444", url: "https://bugzilla.suse.com/1184171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.37.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.37.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.37.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-04-13T15:46:15Z", details: "moderate", }, ], title: "CVE-2021-3444", }, ], }
suse-su-2021:0737-1
Vulnerability from csaf_suse
Published
2021-03-09 15:08
Modified
2021-03-09 15:08
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access
because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).
The following non-security bugs were fixed:
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: fix data bytes_may_use underflow with fallocate due to failed quota reserve (bsc#1182130)
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- net: bcmgenet: add support for ethtool rxnfc flows (git-fixes).
- net: bcmgenet: code movement (git-fixes).
- net: bcmgenet: fix mask check in bcmgenet_validate_flow() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use __be16 for htons(ETH_P_IP) (git-fixes).
- net: bcmgenet: Use correct I/O accessors (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- scsi: target: fix unmap_zeroes_data boolean initialisation (bsc#1163617).
- usb: dwc2: Abort transaction after errors with unknown reason (bsc#1180262).
- usb: dwc2: Do not update data length if it is 0 on inbound transfers (bsc#1180262).
- usb: dwc2: Make 'trimming xfer length' a debug message (bsc#1180262).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
Patchnames
SUSE-2021-737,SUSE-SLE-Module-Live-Patching-15-SP1-2021-737,SUSE-SLE-Product-HA-15-SP1-2021-737,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-737,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-737,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-737,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-737,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-737,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-737,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-737,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-737,SUSE-Storage-6-2021-737
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP1 kernel was updated receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).\n- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).\n- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).\n by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).\n- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access\n because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).\n\nThe following non-security bugs were fixed:\n\n- btrfs: Cleanup try_flush_qgroup (bsc#1182047).\n- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: fix data bytes_may_use underflow with fallocate due to failed quota reserve (bsc#1182130)\n- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).\n- Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).\n- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).\n- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')\n- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).\n- net: bcmgenet: add support for ethtool rxnfc flows (git-fixes).\n- net: bcmgenet: code movement (git-fixes).\n- net: bcmgenet: fix mask check in bcmgenet_validate_flow() (git-fixes).\n- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).\n- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).\n- net: bcmgenet: set Rx mode before starting netif (git-fixes).\n- net: bcmgenet: use __be16 for htons(ETH_P_IP) (git-fixes).\n- net: bcmgenet: Use correct I/O accessors (git-fixes).\n- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).\n- net/mlx4_en: Handle TX error CQE (bsc#1181854).\n- net: moxa: Fix a potential double 'free_irq()' (git-fixes).\n- net: sun: fix missing release regions in cas_init_one() (git-fixes).\n- nvme-multipath: Early exit if no path is available (bsc#1180964).\n- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)\n- scsi: target: fix unmap_zeroes_data boolean initialisation (bsc#1163617).\n- usb: dwc2: Abort transaction after errors with unknown reason (bsc#1180262).\n- usb: dwc2: Do not update data length if it is 0 on inbound transfers (bsc#1180262).\n- usb: dwc2: Make 'trimming xfer length' a debug message (bsc#1180262).\n- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-737,SUSE-SLE-Module-Live-Patching-15-SP1-2021-737,SUSE-SLE-Product-HA-15-SP1-2021-737,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-737,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-737,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-737,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-737,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-737,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-737,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-737,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-737,SUSE-Storage-6-2021-737", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0737-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0737-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210737-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0737-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1163617", url: "https://bugzilla.suse.com/1163617", }, { category: "self", summary: "SUSE Bug 1170442", url: "https://bugzilla.suse.com/1170442", }, { category: "self", summary: "SUSE Bug 1176855", url: "https://bugzilla.suse.com/1176855", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179428", url: "https://bugzilla.suse.com/1179428", }, { category: "self", summary: "SUSE Bug 1179660", url: "https://bugzilla.suse.com/1179660", }, { category: "self", summary: "SUSE Bug 1180058", url: "https://bugzilla.suse.com/1180058", }, { category: "self", summary: "SUSE Bug 1180262", url: "https://bugzilla.suse.com/1180262", }, { category: "self", summary: "SUSE Bug 1180964", url: "https://bugzilla.suse.com/1180964", }, { category: "self", summary: "SUSE Bug 1181671", url: "https://bugzilla.suse.com/1181671", }, { category: "self", summary: "SUSE Bug 1181747", url: "https://bugzilla.suse.com/1181747", }, { category: "self", summary: "SUSE Bug 1181753", url: "https://bugzilla.suse.com/1181753", }, { category: "self", summary: "SUSE Bug 1181843", url: "https://bugzilla.suse.com/1181843", }, { category: "self", summary: "SUSE Bug 1181854", url: "https://bugzilla.suse.com/1181854", }, { category: "self", summary: "SUSE Bug 1182047", url: "https://bugzilla.suse.com/1182047", }, { category: "self", summary: "SUSE Bug 1182130", url: "https://bugzilla.suse.com/1182130", }, { category: "self", summary: "SUSE Bug 1182140", url: "https://bugzilla.suse.com/1182140", }, { category: "self", summary: "SUSE Bug 1182175", url: "https://bugzilla.suse.com/1182175", }, { category: "self", summary: "SUSE CVE CVE-2020-29368 page", url: "https://www.suse.com/security/cve/CVE-2020-29368/", }, { category: "self", summary: "SUSE CVE CVE-2020-29374 page", url: "https://www.suse.com/security/cve/CVE-2020-29374/", }, { category: "self", summary: "SUSE CVE CVE-2021-26930 page", url: "https://www.suse.com/security/cve/CVE-2021-26930/", }, { category: "self", summary: "SUSE CVE CVE-2021-26931 page", url: "https://www.suse.com/security/cve/CVE-2021-26931/", }, { category: "self", summary: "SUSE CVE CVE-2021-26932 page", url: "https://www.suse.com/security/cve/CVE-2021-26932/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-03-09T15:08:10Z", generator: { date: "2021-03-09T15:08:10Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0737-1", initial_release_date: "2021-03-09T15:08:10Z", revision_history: [ { date: "2021-03-09T15:08:10Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-197.86.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-197.86.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-197.86.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-197.86.1.aarch64", product_id: "dlm-kmp-default-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-197.86.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-197.86.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-197.86.1.aarch64", product: { name: "kernel-default-4.12.14-197.86.1.aarch64", product_id: "kernel-default-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-197.86.1.aarch64", product: { name: "kernel-default-base-4.12.14-197.86.1.aarch64", product_id: "kernel-default-base-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-197.86.1.aarch64", product: { name: "kernel-default-devel-4.12.14-197.86.1.aarch64", product_id: "kernel-default-devel-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-197.86.1.aarch64", product: { name: "kernel-default-extra-4.12.14-197.86.1.aarch64", product_id: "kernel-default-extra-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-197.86.1.aarch64", product: { name: "kernel-default-livepatch-4.12.14-197.86.1.aarch64", product_id: "kernel-default-livepatch-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-197.86.1.aarch64", product: { name: "kernel-default-livepatch-devel-4.12.14-197.86.1.aarch64", product_id: "kernel-default-livepatch-devel-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-197.86.1.aarch64", product: { name: "kernel-obs-build-4.12.14-197.86.1.aarch64", product_id: "kernel-obs-build-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-197.86.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-197.86.1.aarch64", product_id: "kernel-obs-qa-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-197.86.1.aarch64", product: { name: "kernel-syms-4.12.14-197.86.1.aarch64", product_id: "kernel-syms-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-197.86.1.aarch64", product: { name: "kernel-vanilla-4.12.14-197.86.1.aarch64", product_id: "kernel-vanilla-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-197.86.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-197.86.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-197.86.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-197.86.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-197.86.1.aarch64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-197.86.1.aarch64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-197.86.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-197.86.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-197.86.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-197.86.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-197.86.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-197.86.1.aarch64", product: { name: "reiserfs-kmp-default-4.12.14-197.86.1.aarch64", product_id: "reiserfs-kmp-default-4.12.14-197.86.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-197.86.1.noarch", product: { name: "kernel-devel-4.12.14-197.86.1.noarch", product_id: "kernel-devel-4.12.14-197.86.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-197.86.1.noarch", product: { name: "kernel-docs-4.12.14-197.86.1.noarch", product_id: "kernel-docs-4.12.14-197.86.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-197.86.1.noarch", product: { name: "kernel-docs-html-4.12.14-197.86.1.noarch", product_id: "kernel-docs-html-4.12.14-197.86.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-197.86.1.noarch", product: { name: "kernel-macros-4.12.14-197.86.1.noarch", product_id: "kernel-macros-4.12.14-197.86.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-197.86.1.noarch", product: { name: "kernel-source-4.12.14-197.86.1.noarch", product_id: "kernel-source-4.12.14-197.86.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-197.86.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-197.86.1.noarch", product_id: "kernel-source-vanilla-4.12.14-197.86.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-197.86.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-197.86.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-197.86.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-197.86.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-197.86.1.ppc64le", product: { name: "kernel-debug-4.12.14-197.86.1.ppc64le", product_id: "kernel-debug-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-197.86.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-197.86.1.ppc64le", product_id: "kernel-debug-base-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-197.86.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-197.86.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-197.86.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-4.12.14-197.86.1.ppc64le", product_id: "kernel-debug-livepatch-devel-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-197.86.1.ppc64le", product: { name: "kernel-default-4.12.14-197.86.1.ppc64le", product_id: "kernel-default-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-197.86.1.ppc64le", product: { name: "kernel-default-base-4.12.14-197.86.1.ppc64le", product_id: "kernel-default-base-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-197.86.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-197.86.1.ppc64le", product_id: "kernel-default-devel-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-197.86.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-197.86.1.ppc64le", product_id: "kernel-default-extra-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-197.86.1.ppc64le", product: { name: "kernel-default-livepatch-4.12.14-197.86.1.ppc64le", product_id: "kernel-default-livepatch-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", product: { name: "kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", product_id: "kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", product: { name: "kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", product_id: "kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-197.86.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-197.86.1.ppc64le", product_id: "kernel-obs-build-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-197.86.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-197.86.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-197.86.1.ppc64le", product: { name: "kernel-syms-4.12.14-197.86.1.ppc64le", product_id: "kernel-syms-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-197.86.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-197.86.1.ppc64le", product_id: "kernel-vanilla-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-197.86.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-197.86.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-197.86.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-197.86.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-197.86.1.ppc64le", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-197.86.1.ppc64le", product_id: "kernel-vanilla-livepatch-devel-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-197.86.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-197.86.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", product: { name: "reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", product_id: "reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-197.86.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-197.86.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-197.86.1.s390x", product: { name: "dlm-kmp-default-4.12.14-197.86.1.s390x", product_id: "dlm-kmp-default-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-197.86.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-197.86.1.s390x", product_id: "gfs2-kmp-default-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-197.86.1.s390x", product: { name: "kernel-default-4.12.14-197.86.1.s390x", product_id: "kernel-default-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-197.86.1.s390x", product: { name: "kernel-default-base-4.12.14-197.86.1.s390x", product_id: "kernel-default-base-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-197.86.1.s390x", product: { name: "kernel-default-devel-4.12.14-197.86.1.s390x", product_id: "kernel-default-devel-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-197.86.1.s390x", product: { name: "kernel-default-extra-4.12.14-197.86.1.s390x", product_id: "kernel-default-extra-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-197.86.1.s390x", product: { name: "kernel-default-livepatch-4.12.14-197.86.1.s390x", product_id: "kernel-default-livepatch-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-197.86.1.s390x", product: { name: "kernel-default-livepatch-devel-4.12.14-197.86.1.s390x", product_id: "kernel-default-livepatch-devel-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-197.86.1.s390x", product: { name: "kernel-default-man-4.12.14-197.86.1.s390x", product_id: "kernel-default-man-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-197.86.1.s390x", product: { name: "kernel-obs-build-4.12.14-197.86.1.s390x", product_id: "kernel-obs-build-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-197.86.1.s390x", product: { name: "kernel-obs-qa-4.12.14-197.86.1.s390x", product_id: "kernel-obs-qa-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-197.86.1.s390x", product: { name: "kernel-syms-4.12.14-197.86.1.s390x", product_id: "kernel-syms-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-197.86.1.s390x", product: { name: "kernel-vanilla-4.12.14-197.86.1.s390x", product_id: "kernel-vanilla-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-197.86.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-197.86.1.s390x", product_id: "kernel-vanilla-base-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-197.86.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-197.86.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-197.86.1.s390x", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-197.86.1.s390x", product_id: "kernel-vanilla-livepatch-devel-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-197.86.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-197.86.1.s390x", product_id: "kernel-zfcpdump-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-197.86.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-197.86.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-197.86.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-197.86.1.s390x", product_id: "kselftests-kmp-default-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-197.86.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-197.86.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-197.86.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-197.86.1.s390x", product: { name: "reiserfs-kmp-default-4.12.14-197.86.1.s390x", product_id: "reiserfs-kmp-default-4.12.14-197.86.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-197.86.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-197.86.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-197.86.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-197.86.1.x86_64", product_id: "dlm-kmp-default-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-197.86.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-197.86.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-197.86.1.x86_64", product: { name: "kernel-debug-4.12.14-197.86.1.x86_64", product_id: "kernel-debug-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-197.86.1.x86_64", product: { name: "kernel-debug-base-4.12.14-197.86.1.x86_64", product_id: "kernel-debug-base-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-197.86.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-197.86.1.x86_64", product_id: "kernel-debug-devel-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-197.86.1.x86_64", product: { name: "kernel-debug-livepatch-devel-4.12.14-197.86.1.x86_64", product_id: "kernel-debug-livepatch-devel-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-197.86.1.x86_64", product: { name: "kernel-default-4.12.14-197.86.1.x86_64", product_id: "kernel-default-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-197.86.1.x86_64", product: { name: "kernel-default-base-4.12.14-197.86.1.x86_64", product_id: "kernel-default-base-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-197.86.1.x86_64", product: { name: "kernel-default-devel-4.12.14-197.86.1.x86_64", product_id: "kernel-default-devel-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-197.86.1.x86_64", product: { name: "kernel-default-extra-4.12.14-197.86.1.x86_64", product_id: "kernel-default-extra-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-197.86.1.x86_64", product: { name: "kernel-default-livepatch-4.12.14-197.86.1.x86_64", product_id: "kernel-default-livepatch-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", product: { name: "kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", product_id: "kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-197.86.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-197.86.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-197.86.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-197.86.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-197.86.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-197.86.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-4.12.14-197.86.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-4.12.14-197.86.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", product: { name: "kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", product_id: "kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-197.86.1.x86_64", product: { name: "kernel-obs-build-4.12.14-197.86.1.x86_64", product_id: "kernel-obs-build-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-197.86.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-197.86.1.x86_64", product_id: "kernel-obs-qa-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-197.86.1.x86_64", product: { name: "kernel-syms-4.12.14-197.86.1.x86_64", product_id: "kernel-syms-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-197.86.1.x86_64", product: { name: "kernel-vanilla-4.12.14-197.86.1.x86_64", product_id: "kernel-vanilla-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-197.86.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-197.86.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-197.86.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-197.86.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-197.86.1.x86_64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-197.86.1.x86_64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-197.86.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-197.86.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-197.86.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-197.86.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-197.86.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64", product: { name: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64", product_id: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP1", product: { name: "SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP1", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.0", product: { name: "SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.0", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.0", product: { name: "SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.0", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.0", product: { name: "SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.0", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-default-livepatch-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-livepatch-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", }, product_reference: "kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", }, product_reference: "cluster-md-kmp-default-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-197.86.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", }, product_reference: "dlm-kmp-default-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-197.86.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", }, product_reference: "gfs2-kmp-default-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-197.86.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", }, product_reference: "ocfs2-kmp-default-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-197.86.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-default-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", }, product_reference: "kernel-devel-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", }, product_reference: "kernel-docs-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", }, product_reference: "kernel-macros-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", }, product_reference: "kernel-source-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-syms-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-syms-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-default-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", }, product_reference: "kernel-devel-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", }, product_reference: "kernel-docs-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", }, product_reference: "kernel-macros-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", }, product_reference: "kernel-source-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-syms-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-syms-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", }, product_reference: "kernel-devel-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", }, product_reference: "kernel-docs-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", }, product_reference: "kernel-macros-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", }, product_reference: "kernel-source-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-syms-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-default-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-default-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", }, product_reference: "kernel-default-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", }, product_reference: "kernel-default-base-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-197.86.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", }, product_reference: "kernel-default-man-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", }, product_reference: "kernel-devel-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", }, product_reference: "kernel-docs-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", }, product_reference: "kernel-macros-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", }, product_reference: "kernel-source-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-syms-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", }, product_reference: "kernel-syms-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-syms-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-default-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", }, product_reference: "kernel-devel-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", }, product_reference: "kernel-docs-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", }, product_reference: "kernel-macros-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-197.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", }, product_reference: "kernel-source-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-syms-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-197.86.1.noarch as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", }, product_reference: "kernel-devel-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-197.86.1.noarch as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", }, product_reference: "kernel-docs-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-197.86.1.noarch as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", }, product_reference: "kernel-macros-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-197.86.1.noarch as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", }, product_reference: "kernel-source-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-syms-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64 as component of SUSE Manager Proxy 4.0", product_id: "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-197.86.1.noarch as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", }, product_reference: "kernel-devel-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-197.86.1.noarch as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", }, product_reference: "kernel-docs-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-197.86.1.noarch as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", }, product_reference: "kernel-macros-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-197.86.1.noarch as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", }, product_reference: "kernel-source-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-syms-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", product_id: "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-default-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", }, product_reference: "kernel-default-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", }, product_reference: "kernel-default-base-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-197.86.1.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", }, product_reference: "kernel-default-man-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-197.86.1.noarch as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", }, product_reference: "kernel-devel-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-197.86.1.noarch as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", }, product_reference: "kernel-docs-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-197.86.1.noarch as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", }, product_reference: "kernel-macros-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-197.86.1.noarch as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", }, product_reference: "kernel-source-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", }, product_reference: "kernel-syms-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-syms-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.ppc64le as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.s390x as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64 as component of SUSE Manager Server 4.0", product_id: "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-default-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.86.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.86.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.86.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-197.86.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", }, product_reference: "kernel-devel-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-197.86.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", }, product_reference: "kernel-docs-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-197.86.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", }, product_reference: "kernel-macros-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.86.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-197.86.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", }, product_reference: "kernel-source-4.12.14-197.86.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", }, product_reference: "kernel-syms-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.86.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", }, product_reference: "kernel-syms-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.86.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, ], }, vulnerabilities: [ { cve: "CVE-2020-29368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29368", }, ], notes: [ { category: "general", text: "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29368", url: "https://www.suse.com/security/cve/CVE-2020-29368", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179660", }, { category: "external", summary: "SUSE Bug 1179664 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:10Z", details: "moderate", }, ], title: "CVE-2020-29368", }, { cve: "CVE-2020-29374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29374", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29374", url: "https://www.suse.com/security/cve/CVE-2020-29374", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:10Z", details: "low", }, ], title: "CVE-2020-29374", }, { cve: "CVE-2021-26930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26930", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26930", url: "https://www.suse.com/security/cve/CVE-2021-26930", }, { category: "external", summary: "SUSE Bug 1181843 for CVE-2021-26930", url: "https://bugzilla.suse.com/1181843", }, { category: "external", summary: "SUSE Bug 1182294 for CVE-2021-26930", url: "https://bugzilla.suse.com/1182294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:10Z", details: "important", }, ], title: "CVE-2021-26930", }, { cve: "CVE-2021-26931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26931", url: "https://www.suse.com/security/cve/CVE-2021-26931", }, { category: "external", summary: "SUSE Bug 1181753 for CVE-2021-26931", url: "https://bugzilla.suse.com/1181753", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-26931", url: "https://bugzilla.suse.com/1183022", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:10Z", details: "moderate", }, ], title: "CVE-2021-26931", }, { cve: "CVE-2021-26932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26932", url: "https://www.suse.com/security/cve/CVE-2021-26932", }, { category: "external", summary: "SUSE Bug 1181747 for CVE-2021-26932", url: "https://bugzilla.suse.com/1181747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.86.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.86.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.86.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.86.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:10Z", details: "moderate", }, ], title: "CVE-2021-26932", }, ], }
suse-su-2021:0740-1
Vulnerability from csaf_suse
Published
2021-03-09 15:10
Modified
2021-03-09 15:10
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access
because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).
The following non-security bugs were fixed:
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015).
- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014)
- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.
- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead.
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)
- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).
- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one).
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
Patchnames
SUSE-2021-740,SUSE-SLE-Module-Live-Patching-15-2021-740,SUSE-SLE-Product-HA-15-2021-740,SUSE-SLE-Product-HPC-15-2021-740,SUSE-SLE-Product-SLES-15-2021-740,SUSE-SLE-Product-SLES_SAP-15-2021-740
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).\n- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).\n- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).\n by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).\n- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access\n because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).\n\nThe following non-security bugs were fixed:\n\n- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)\n- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). \n- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014) \n- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.\n- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.\n- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead.\n- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)\n- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)\n- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).\n- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one). \n- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-740,SUSE-SLE-Module-Live-Patching-15-2021-740,SUSE-SLE-Product-HA-15-2021-740,SUSE-SLE-Product-HPC-15-2021-740,SUSE-SLE-Product-SLES-15-2021-740,SUSE-SLE-Product-SLES_SAP-15-2021-740", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0740-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0740-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210740-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0740-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1163592", url: "https://bugzilla.suse.com/1163592", }, { category: "self", summary: "SUSE Bug 1178401", url: "https://bugzilla.suse.com/1178401", }, { category: "self", summary: "SUSE Bug 1178762", url: "https://bugzilla.suse.com/1178762", }, { category: "self", summary: "SUSE Bug 1179014", url: "https://bugzilla.suse.com/1179014", }, { category: "self", summary: "SUSE Bug 1179015", url: "https://bugzilla.suse.com/1179015", }, { category: "self", summary: "SUSE Bug 1179045", url: "https://bugzilla.suse.com/1179045", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179428", url: "https://bugzilla.suse.com/1179428", }, { category: "self", summary: "SUSE Bug 1179660", url: "https://bugzilla.suse.com/1179660", }, { category: "self", summary: "SUSE Bug 1180058", url: "https://bugzilla.suse.com/1180058", }, { category: "self", summary: "SUSE Bug 1181747", url: "https://bugzilla.suse.com/1181747", }, { category: "self", summary: "SUSE Bug 1181753", url: "https://bugzilla.suse.com/1181753", }, { category: "self", summary: "SUSE Bug 1181843", url: "https://bugzilla.suse.com/1181843", }, { category: "self", summary: "SUSE Bug 1182140", url: "https://bugzilla.suse.com/1182140", }, { category: "self", summary: "SUSE Bug 1182175", url: "https://bugzilla.suse.com/1182175", }, { category: "self", summary: "SUSE CVE CVE-2020-29368 page", url: "https://www.suse.com/security/cve/CVE-2020-29368/", }, { category: "self", summary: "SUSE CVE CVE-2020-29374 page", url: "https://www.suse.com/security/cve/CVE-2020-29374/", }, { category: "self", summary: "SUSE CVE CVE-2021-26930 page", url: "https://www.suse.com/security/cve/CVE-2021-26930/", }, { category: "self", summary: "SUSE CVE CVE-2021-26931 page", url: "https://www.suse.com/security/cve/CVE-2021-26931/", }, { category: "self", summary: "SUSE CVE CVE-2021-26932 page", url: "https://www.suse.com/security/cve/CVE-2021-26932/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-03-09T15:10:21Z", generator: { date: "2021-03-09T15:10:21Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0740-1", initial_release_date: "2021-03-09T15:10:21Z", revision_history: [ { date: "2021-03-09T15:10:21Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150.69.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-150.69.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150.69.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-150.69.1.aarch64", product_id: "dlm-kmp-default-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150.69.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-150.69.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-150.69.1.aarch64", product: { name: "kernel-default-4.12.14-150.69.1.aarch64", product_id: "kernel-default-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150.69.1.aarch64", product: { name: "kernel-default-base-4.12.14-150.69.1.aarch64", product_id: "kernel-default-base-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150.69.1.aarch64", product: { name: "kernel-default-devel-4.12.14-150.69.1.aarch64", product_id: "kernel-default-devel-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150.69.1.aarch64", product: { name: "kernel-default-extra-4.12.14-150.69.1.aarch64", product_id: "kernel-default-extra-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150.69.1.aarch64", product: { name: "kernel-default-livepatch-4.12.14-150.69.1.aarch64", product_id: "kernel-default-livepatch-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150.69.1.aarch64", product: { name: "kernel-default-livepatch-devel-4.12.14-150.69.1.aarch64", product_id: "kernel-default-livepatch-devel-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150.69.1.aarch64", product: { name: "kernel-obs-build-4.12.14-150.69.1.aarch64", product_id: "kernel-obs-build-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150.69.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-150.69.1.aarch64", product_id: "kernel-obs-qa-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150.69.1.aarch64", product: { name: "kernel-syms-4.12.14-150.69.1.aarch64", product_id: "kernel-syms-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150.69.1.aarch64", product: { name: "kernel-vanilla-4.12.14-150.69.1.aarch64", product_id: "kernel-vanilla-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150.69.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-150.69.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150.69.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-150.69.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150.69.1.aarch64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150.69.1.aarch64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150.69.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-150.69.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150.69.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-150.69.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-150.69.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150.69.1.aarch64", product: { name: "reiserfs-kmp-default-4.12.14-150.69.1.aarch64", product_id: "reiserfs-kmp-default-4.12.14-150.69.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-150.69.1.noarch", product: { name: "kernel-devel-4.12.14-150.69.1.noarch", product_id: "kernel-devel-4.12.14-150.69.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-150.69.1.noarch", product: { name: "kernel-docs-4.12.14-150.69.1.noarch", product_id: "kernel-docs-4.12.14-150.69.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-150.69.1.noarch", product: { name: "kernel-docs-html-4.12.14-150.69.1.noarch", product_id: "kernel-docs-html-4.12.14-150.69.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-150.69.1.noarch", product: { name: "kernel-macros-4.12.14-150.69.1.noarch", product_id: "kernel-macros-4.12.14-150.69.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-150.69.1.noarch", product: { name: "kernel-source-4.12.14-150.69.1.noarch", product_id: "kernel-source-4.12.14-150.69.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-150.69.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-150.69.1.noarch", product_id: "kernel-source-vanilla-4.12.14-150.69.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150.69.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-150.69.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150.69.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-150.69.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-150.69.1.ppc64le", product: { name: "kernel-debug-4.12.14-150.69.1.ppc64le", product_id: "kernel-debug-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-150.69.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-150.69.1.ppc64le", product_id: "kernel-debug-base-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-150.69.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-150.69.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-150.69.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-4.12.14-150.69.1.ppc64le", product_id: "kernel-debug-livepatch-devel-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-150.69.1.ppc64le", product: { name: "kernel-default-4.12.14-150.69.1.ppc64le", product_id: "kernel-default-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150.69.1.ppc64le", product: { name: "kernel-default-base-4.12.14-150.69.1.ppc64le", product_id: "kernel-default-base-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150.69.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-150.69.1.ppc64le", product_id: "kernel-default-devel-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150.69.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-150.69.1.ppc64le", product_id: "kernel-default-extra-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150.69.1.ppc64le", product: { name: "kernel-default-livepatch-4.12.14-150.69.1.ppc64le", product_id: "kernel-default-livepatch-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150.69.1.ppc64le", product: { name: "kernel-default-livepatch-devel-4.12.14-150.69.1.ppc64le", product_id: "kernel-default-livepatch-devel-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", product: { name: "kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", product_id: "kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150.69.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-150.69.1.ppc64le", product_id: "kernel-obs-build-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150.69.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-150.69.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150.69.1.ppc64le", product: { name: "kernel-syms-4.12.14-150.69.1.ppc64le", product_id: "kernel-syms-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150.69.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-150.69.1.ppc64le", product_id: "kernel-vanilla-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150.69.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-150.69.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150.69.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-150.69.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150.69.1.ppc64le", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150.69.1.ppc64le", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150.69.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-150.69.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", product: { name: "reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", product_id: "reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150.69.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-150.69.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150.69.1.s390x", product: { name: "dlm-kmp-default-4.12.14-150.69.1.s390x", product_id: "dlm-kmp-default-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150.69.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-150.69.1.s390x", product_id: "gfs2-kmp-default-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-150.69.1.s390x", product: { name: "kernel-default-4.12.14-150.69.1.s390x", product_id: "kernel-default-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150.69.1.s390x", product: { name: "kernel-default-base-4.12.14-150.69.1.s390x", product_id: "kernel-default-base-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150.69.1.s390x", product: { name: "kernel-default-devel-4.12.14-150.69.1.s390x", product_id: "kernel-default-devel-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150.69.1.s390x", product: { name: "kernel-default-extra-4.12.14-150.69.1.s390x", product_id: "kernel-default-extra-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150.69.1.s390x", product: { name: "kernel-default-livepatch-4.12.14-150.69.1.s390x", product_id: "kernel-default-livepatch-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150.69.1.s390x", product: { name: "kernel-default-livepatch-devel-4.12.14-150.69.1.s390x", product_id: "kernel-default-livepatch-devel-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-150.69.1.s390x", product: { name: "kernel-default-man-4.12.14-150.69.1.s390x", product_id: "kernel-default-man-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150.69.1.s390x", product: { name: "kernel-obs-build-4.12.14-150.69.1.s390x", product_id: "kernel-obs-build-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150.69.1.s390x", product: { name: "kernel-obs-qa-4.12.14-150.69.1.s390x", product_id: "kernel-obs-qa-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150.69.1.s390x", product: { name: "kernel-syms-4.12.14-150.69.1.s390x", product_id: "kernel-syms-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150.69.1.s390x", product: { name: "kernel-vanilla-4.12.14-150.69.1.s390x", product_id: "kernel-vanilla-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150.69.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-150.69.1.s390x", product_id: "kernel-vanilla-base-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150.69.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-150.69.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150.69.1.s390x", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150.69.1.s390x", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-150.69.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-150.69.1.s390x", product_id: "kernel-zfcpdump-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-150.69.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-150.69.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150.69.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-150.69.1.s390x", product_id: "kselftests-kmp-default-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150.69.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-150.69.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-150.69.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150.69.1.s390x", product: { name: "reiserfs-kmp-default-4.12.14-150.69.1.s390x", product_id: "reiserfs-kmp-default-4.12.14-150.69.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150.69.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-150.69.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150.69.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-150.69.1.x86_64", product_id: "dlm-kmp-default-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150.69.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-150.69.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-150.69.1.x86_64", product: { name: "kernel-debug-4.12.14-150.69.1.x86_64", product_id: "kernel-debug-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-150.69.1.x86_64", product: { name: "kernel-debug-base-4.12.14-150.69.1.x86_64", product_id: "kernel-debug-base-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-150.69.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-150.69.1.x86_64", product_id: "kernel-debug-devel-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-150.69.1.x86_64", product: { name: "kernel-debug-livepatch-devel-4.12.14-150.69.1.x86_64", product_id: "kernel-debug-livepatch-devel-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-150.69.1.x86_64", product: { name: "kernel-default-4.12.14-150.69.1.x86_64", product_id: "kernel-default-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150.69.1.x86_64", product: { name: "kernel-default-base-4.12.14-150.69.1.x86_64", product_id: "kernel-default-base-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150.69.1.x86_64", product: { name: "kernel-default-devel-4.12.14-150.69.1.x86_64", product_id: "kernel-default-devel-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150.69.1.x86_64", product: { name: "kernel-default-extra-4.12.14-150.69.1.x86_64", product_id: "kernel-default-extra-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150.69.1.x86_64", product: { name: "kernel-default-livepatch-4.12.14-150.69.1.x86_64", product_id: "kernel-default-livepatch-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150.69.1.x86_64", product: { name: "kernel-default-livepatch-devel-4.12.14-150.69.1.x86_64", product_id: "kernel-default-livepatch-devel-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-150.69.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-150.69.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-150.69.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-150.69.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-150.69.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-150.69.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-4.12.14-150.69.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-4.12.14-150.69.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", product: { name: "kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", product_id: "kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150.69.1.x86_64", product: { name: "kernel-obs-build-4.12.14-150.69.1.x86_64", product_id: "kernel-obs-build-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150.69.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-150.69.1.x86_64", product_id: "kernel-obs-qa-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150.69.1.x86_64", product: { name: "kernel-syms-4.12.14-150.69.1.x86_64", product_id: "kernel-syms-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150.69.1.x86_64", product: { name: "kernel-vanilla-4.12.14-150.69.1.x86_64", product_id: "kernel-vanilla-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150.69.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-150.69.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150.69.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-150.69.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150.69.1.x86_64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150.69.1.x86_64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150.69.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-150.69.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150.69.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-150.69.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-150.69.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150.69.1.x86_64", product: { name: "reiserfs-kmp-default-4.12.14-150.69.1.x86_64", product_id: "reiserfs-kmp-default-4.12.14-150.69.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15", product: { name: "SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15", product: { name: "SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-default-livepatch-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-livepatch-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", }, product_reference: "kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", }, product_reference: "cluster-md-kmp-default-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150.69.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-150.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", }, product_reference: "dlm-kmp-default-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150.69.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-150.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", }, product_reference: "gfs2-kmp-default-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150.69.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-150.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", }, product_reference: "ocfs2-kmp-default-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150.69.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-150.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-default-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", }, product_reference: "kernel-devel-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", }, product_reference: "kernel-docs-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", }, product_reference: "kernel-macros-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", }, product_reference: "kernel-source-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-syms-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-syms-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-vanilla-base-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-default-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", }, product_reference: "kernel-devel-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", }, product_reference: "kernel-docs-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", }, product_reference: "kernel-macros-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", }, product_reference: "kernel-source-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-syms-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-syms-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-vanilla-base-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-default-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-default-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", }, product_reference: "kernel-default-4.12.14-150.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", }, product_reference: "kernel-default-base-4.12.14-150.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-150.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-150.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", }, product_reference: "kernel-default-man-4.12.14-150.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", }, product_reference: "kernel-devel-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", }, product_reference: "kernel-docs-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", }, product_reference: "kernel-macros-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-150.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", }, product_reference: "kernel-source-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-syms-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", }, product_reference: "kernel-syms-4.12.14-150.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-syms-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", }, product_reference: "kernel-vanilla-base-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-vanilla-base-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", }, product_reference: "kernel-vanilla-base-4.12.14-150.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.69.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", }, product_reference: "reiserfs-kmp-default-4.12.14-150.69.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.69.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", }, product_reference: "reiserfs-kmp-default-4.12.14-150.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-default-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", }, product_reference: "kernel-devel-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", }, product_reference: "kernel-docs-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", }, product_reference: "kernel-macros-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-150.69.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", }, product_reference: "kernel-source-4.12.14-150.69.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-syms-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", }, product_reference: "kernel-vanilla-base-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.69.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.69.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-150.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, ], }, vulnerabilities: [ { cve: "CVE-2020-29368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29368", }, ], notes: [ { category: "general", text: "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29368", url: "https://www.suse.com/security/cve/CVE-2020-29368", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179660", }, { category: "external", summary: "SUSE Bug 1179664 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:10:21Z", details: "moderate", }, ], title: "CVE-2020-29368", }, { cve: "CVE-2020-29374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29374", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29374", url: "https://www.suse.com/security/cve/CVE-2020-29374", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:10:21Z", details: "low", }, ], title: "CVE-2020-29374", }, { cve: "CVE-2021-26930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26930", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26930", url: "https://www.suse.com/security/cve/CVE-2021-26930", }, { category: "external", summary: "SUSE Bug 1181843 for CVE-2021-26930", url: "https://bugzilla.suse.com/1181843", }, { category: "external", summary: "SUSE Bug 1182294 for CVE-2021-26930", url: "https://bugzilla.suse.com/1182294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:10:21Z", details: "important", }, ], title: "CVE-2021-26930", }, { cve: "CVE-2021-26931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26931", url: "https://www.suse.com/security/cve/CVE-2021-26931", }, { category: "external", summary: "SUSE Bug 1181753 for CVE-2021-26931", url: "https://bugzilla.suse.com/1181753", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-26931", url: "https://bugzilla.suse.com/1183022", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:10:21Z", details: "moderate", }, ], title: "CVE-2021-26931", }, { cve: "CVE-2021-26932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26932", url: "https://www.suse.com/security/cve/CVE-2021-26932", }, { category: "external", summary: "SUSE Bug 1181747 for CVE-2021-26932", url: "https://bugzilla.suse.com/1181747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.69.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.69.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.69.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:10:21Z", details: "moderate", }, ], title: "CVE-2021-26932", }, ], }
suse-su-2021:0738-1
Vulnerability from csaf_suse
Published
2021-03-09 15:08
Modified
2021-03-09 15:08
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel Azure was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially
enable an escalation of privilege via local access (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially
enable a denial of service via local access (bsc#1181735).
- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially
enable a denial of service via local access (bsc#1181736 ).
- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user
to potentially enable a denial of service via local access (bsc#1181738).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access
because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).
The following non-security bugs were fixed:
- ACPICA: Fix exception code class checks (git-fixes).
- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).
- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).
- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).
- ALSA: pcm: Call sync_stop at disconnection (git-fixes).
- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).
- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).
- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).
- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).
- ALSA: usb-audio: More strict state change in EP (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cpcap: fix microphone timeslot mask (git-fixes).
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ASoC: simple-card-utils: Fix device module clock (git-fixes).
- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).
- ata: ahci_brcm: Add back regulators management (git-fixes).
- ata: sata_nv: Fix retrieving of active qcs (git-fixes).
- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- bcache: fix overflow in offset_to_stripe() (git-fixes).
- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).
- blk-mq: insert request not through ->queue_rq into sw/scheduler queue (bsc#1182443).
- blk-mq: move cancel of hctx->run_work to the front of blk_exit_queue (bsc#1182444).
- block: fix inflight statistics of part0 (bsc#1182445).
- block: respect queue limit of max discard segment (bsc#1182441).
- block: virtio_blk: fix handling single range discard request (bsc#1182439).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bnxt_en: Fix accumulation of bp->net_stats_prev (git-fixes).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: set dev->needed_headroom in bond_setup_by_slave() (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).
- bpf, cgroup: Fix problematic bounds check (bsc#1155518).
- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).
- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).
- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- ceph: fix flush_snap logic after putting caps (bsc#1182854).
- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).
- cgroup: fix psi monitor for root cgroup (bsc#1182686).
- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).
- chelsio/chtls: correct function return and return type (git-fixes).
- chelsio/chtls: correct netdevice for vlan interface (git-fixes).
- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).
- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).
- chelsio/chtls: fix deadlock issue (git-fixes).
- chelsio/chtls: fix memory leaks caused by a race (git-fixes).
- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).
- chelsio/chtls: fix panic during unload reload chtls (git-fixes).
- chelsio/chtls: fix socket lock (git-fixes).
- chelsio/chtls: fix tls record info to user (git-fixes).
- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).
- chtls: Added a check to avoid NULL pointer dereference (git-fixes).
- chtls: Fix chtls resources release sequence (git-fixes).
- chtls: Fix hardware tid leak (git-fixes).
- chtls: Fix panic when route to peer not configured (git-fixes).
- chtls: Remove invalid set_tcb call (git-fixes).
- chtls: Replace skb_dequeue with skb_peek (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).
- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).
- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).
- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).
- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).
- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).
- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).
- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in ->remove() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).
- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).
- crypto: ecdh_helper - Ensure 'len >= secret.len' in decode_key() (git-fixes).
- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4: fix all-mask IP address comparison (git-fixes).
- cxgb4: fix checks for max queues to allocate (git-fixes).
- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).
- cxgb4: fix SGE queue dump destination buffer context (git-fixes).
- cxgb4: fix the panic caused by non smac rewrite (git-fixes).
- cxgb4: move DCB version extern to header file (git-fixes).
- cxgb4: move handling L2T ARP failures to caller (git-fixes).
- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).
- cxgb4: parse TC-U32 key values and masks natively (git-fixes).
- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).
- cxgb4: set up filter action after rewrites (git-fixes).
- cxgb4: use correct type for all-mask IP address comparison (git-fixes).
- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).
- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).
- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).
- dm crypt: avoid truncating the logical block size (git-fixes).
- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).
- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).
- dm thin metadata: Avoid returning cmd->bm wild pointer on error (bsc#1177529).
- dm thin metadata: fix lockdep complaint (bsc#1177529).
- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).
- dm: use noio when sending kobject event (bsc#1177529).
- docs: filesystems: vfs: correct flag name (bsc#1182856).
- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).
- Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).
- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).
- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).
- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).
- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).
- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).
- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).
- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).
- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).
- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).
- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).
- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).
- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).
- drm/meson: Unbind all connectors on module removal (bsc#1152472)
- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)
- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)
- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)
- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)
- Drop HID logitech patch that caused a regression (bsc#1182259)
- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).
- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware_loader: align .builtin_fw to 8 (git-fixes).
- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).
- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- gma500: clean up error handling in init (git-fixes).
- gpio: pcf857x: Fix missing first interrupt (git-fixes).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).
- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).
- i2c: stm32f7: fix configuration of the digital filter (git-fixes).
- i3c: master: dw: Drop redundant disec call (git-fixes).
- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).
- i40e: avoid premature Rx buffer reuse (git-fixes).
- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).
- iavf: fix double-release of rtnl_lock (git-fixes).
- iavf: fix error return code in iavf_init_get_resources() (git-fixes).
- iavf: fix speed reporting over virtchnl (git-fixes).
- iavf: Fix updating statistics (git-fixes).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).
- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).
- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (jsc#SLE-17268).
- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).
- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).
- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).
- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).
- igc: fix link speed advertising (git-fixes).
- igc: Fix returning wrong statistics (git-fixes).
- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).
- include/linux/memremap.h: remove stale comments (git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- Input: sur40 - fix an error code in sur40_probe() (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).
- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).
- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).
- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).
- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).
- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).
- iwlwifi: pcie: fix context info memory leak (git-fixes).
- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).
- ixgbe: avoid premature Rx buffer reuse (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).
- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).
- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).
- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).
- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).
- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).
- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).
- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).
- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).
- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).
- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).
- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).
- KVM: x86: clear stale x86_emulate_ctxt->intercept value (bsc#1182381).
- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).
- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).
- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).
- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).
- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).
- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).
- mac80211: fix fast-rx encryption check (git-fixes).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- mac80211: pause TX while changing interface type (git-fixes).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.
- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).
- matroxfb: avoid -Warray-bounds warning (bsc#1152472)
- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).
- media: camss: missing error code in msm_video_register() (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).
- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).
- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).
- media: lmedm04: Fix misuse of comma (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: mt9v111: Remove unneeded device-managed puts (git-fixes).
- media: pwc: Use correct device for DMA (bsc#1181133).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).
- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).
- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).
- mlxsw: core: Fix memory leak on module removal (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).
- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).
- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).
- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).
- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).
- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).
- net: axienet: Fix error return code in axienet_probe() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use hardware padding of runt frames (git-fixes).
- net: broadcom CNIC: requires MMU (git-fixes).
- net: caif: Fix debugfs on 64-bit platforms (git-fixes).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).
- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).
- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: ave: Fix error returns in ave_init (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).
- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).
- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).
- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).
- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).
- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gro: do not keep too many GRO packets in napi->rx_list (bsc#1154353).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).
- net: hns3: add reset check for VF updating port based VLAN (git-fixes).
- net: hns3: clear port base VLAN when unload PF (git-fixes).
- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).
- net: hns3: fix a TX timeout issue (git-fixes).
- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).
- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).
- net: hns3: fix for VLAN config when reset failed (git-fixes).
- net: hns3: fix RSS config lost after VF reset (git-fixes).
- net: hns3: fix set and get link ksettings issue (git-fixes).
- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).
- net: hns3: fix the number of queues actually used by ARQ (git-fixes).
- net: hns3: fix use-after-free when doing self test (git-fixes).
- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).
- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).
- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix init_hca fields offset (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net/mlx5: Add handling of port type in rule deletion (git-fixes).
- net/mlx5: Annotate mutex destroy for root ns (git-fixes).
- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).
- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).
- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).
- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).
- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).
- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).
- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (git-fixes).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).
- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).
- net/mlx5e: Reduce tc unsupported key print level (git-fixes).
- net/mlx5e: Rename hw_modify to preactivate (git-fixes).
- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).
- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).
- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).
- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net/mlx5: Fix deletion of duplicate rules (git-fixes).
- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).
- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).
- net/mlx5: Fix request_irqs error flow (git-fixes).
- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).
- net/mlx5: Query PPS pin operational status before registering it (git-fixes).
- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).
- net: mscc: ocelot: fix address ageing time (again) (git-fixes).
- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).
- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
- net: mvpp2: disable force link UP during port init procedure (git-fixes).
- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).
- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).
- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).
- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).
- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).
- net: octeon: mgmt: Repair filling of RX ring (git-fixes).
- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).
- net: phy: extract link partner advertisement reading (git-fixes).
- net: phy: extract pause mode (git-fixes).
- net: phy: marvell10g: fix null pointer dereference (git-fixes).
- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).
- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).
- net: qca_spi: fix receive buffer size check (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: qede: fix PTP initialization on recovery (git-fixes).
- net: qede: fix use-after-free on recovery and AER handling (git-fixes).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix async event callbacks unregistering (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: re-solve some conflicts after net -> net-next merge (bsc#1176855 ltc#187293).
- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).
- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).
- net: rmnet: fix bridge mode bugs (git-fixes).
- net: rmnet: fix lower interface leak (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).
- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).
- net: rmnet: fix suspicious RCU usage (git-fixes).
- net: rmnet: print error message when command fails (git-fixes).
- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).
- net: rmnet: use upper/lower device infrastructure (git-fixes).
- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: fix disabling flexible PPS output (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: Fix the TX IOC in xmit path (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).
- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).
- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).
- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).
- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).
- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).
- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).
- perf/x86/intel/uncore: With > 8 nodes, get pci bus die id from NUMA info (bsc#1180989).
- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).
- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).
- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).
- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).
- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).
- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).
- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).
- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).
- qed: select CONFIG_CRC32 (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).
- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).
- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)
- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)
- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)
- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).
- RDMA/efa: Count admin commands errors (bsc#1176248).
- RDMA/efa: Count mmap failures (bsc#1176248).
- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).
- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).
- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).
- RDMA/efa: Expose minimum SQ size (bsc#1176248).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).
- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).
- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).
- RDMA/efa: Report create CQ error counter (bsc#1176248).
- RDMA/efa: Report host information to the device (bsc#1176248).
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).
- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).
- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).
- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).
- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).
- regulator: Fix lockdep warning resolving supplies (git-fixes).
- regulator: s5m8767: Drop regulators OF node reference (git-fixes).
- regulator: s5m8767: Fix reference count leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- Remove debug patch for boot failure (bsc#1182602 ltc#190924).
- reset: hisilicon: correct vendor prefix (git-fixes).
- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).
- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).
- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).
- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- rtc: s5m: select REGMAP_I2C (git-fixes).
- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).
- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).
- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).
- sched: Reenable interrupts in do_sched_yield() (git-fixes)
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).
- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).
- smsc95xx: check return value of smsc95xx_reset (git-fixes).
- soc: aspeed: snoop: Add clock control logic (git-fixes).
- spi: atmel: Put allocated master before return (git-fixes).
- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).
- spi: spi-synquacer: fix set_cs handling (git-fixes).
- spi: stm32: properly handle 0 byte transfer (git-fixes).
- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).
- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).
- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).
- team: set dev->needed_headroom in team_setup_by_port() (git-fixes).
- tpm: Remove tpm_dev_wq_lock (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).
- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).
- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).
- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).
- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).
- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).
- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455).
- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).
- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).
- USB: gadget: u_audio: Free requests only after callback (git-fixes).
- USB: musb: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: quirks: sort quirk entries (git-fixes).
- USB: renesas_usbhs: Clear pipe running flag in usbhs_pkt_pop() (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).
- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).
- virtio_net: Fix error code in probe() (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- vxlan: fix memleak of fdb (git-fixes).
- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).
- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).
- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).
- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).
- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).
- xfs: ratelimit xfs_discard_page messages (bsc#1182283).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).
- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).
- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).
Patchnames
SUSE-2021-738,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-738
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP2 kernel Azure was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).\n- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).\n- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).\n by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).\n- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially \n enable an escalation of privilege via local access (bsc#1181720).\n- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially \n enable a denial of service via local access (bsc#1181735).\n- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially \n enable a denial of service via local access (bsc#1181736 ).\n- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user \n to potentially enable a denial of service via local access (bsc#1181738).\n- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access \n because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Fix exception code class checks (git-fixes).\n- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).\n- ACPI: property: Fix fwnode string properties matching (git-fixes).\n- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).\n- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).\n- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).\n- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).\n- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).\n- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).\n- ALSA: pcm: Call sync_stop at disconnection (git-fixes).\n- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).\n- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).\n- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).\n- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).\n- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).\n- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).\n- ALSA: usb-audio: More strict state change in EP (git-fixes).\n- amba: Fix resource leak for drivers without .remove (git-fixes).\n- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)\n- ASoC: cpcap: fix microphone timeslot mask (git-fixes).\n- ASoC: cs42l56: fix up error handling in probe (git-fixes).\n- ASoC: simple-card-utils: Fix device module clock (git-fixes).\n- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).\n- ata: ahci_brcm: Add back regulators management (git-fixes).\n- ata: sata_nv: Fix retrieving of active qcs (git-fixes).\n- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).\n- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).\n- bcache: fix overflow in offset_to_stripe() (git-fixes).\n- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).\n- blk-mq: insert request not through ->queue_rq into sw/scheduler queue (bsc#1182443).\n- blk-mq: move cancel of hctx->run_work to the front of blk_exit_queue (bsc#1182444).\n- block: fix inflight statistics of part0 (bsc#1182445).\n- block: respect queue limit of max discard segment (bsc#1182441).\n- block: virtio_blk: fix handling single range discard request (bsc#1182439).\n- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).\n- Bluetooth: drop HCI device reference before return (git-fixes).\n- Bluetooth: Fix initializing response id after clearing struct (git-fixes).\n- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).\n- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).\n- bnxt_en: Fix accumulation of bp->net_stats_prev (git-fixes).\n- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).\n- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).\n- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).\n- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).\n- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).\n- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).\n- bonding: set dev->needed_headroom in bond_setup_by_slave() (git-fixes).\n- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).\n- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).\n- bpf, cgroup: Fix problematic bounds check (bsc#1155518).\n- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).\n- btrfs: Cleanup try_flush_qgroup (bsc#1182047).\n- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).\n- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).\n- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).\n- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).\n- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).\n- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).\n- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).\n- caif: no need to check return value of debugfs_create functions (git-fixes).\n- ceph: fix flush_snap logic after putting caps (bsc#1182854).\n- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).\n- cgroup: fix psi monitor for root cgroup (bsc#1182686).\n- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).\n- chelsio/chtls: correct function return and return type (git-fixes).\n- chelsio/chtls: correct netdevice for vlan interface (git-fixes).\n- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).\n- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).\n- chelsio/chtls: fix deadlock issue (git-fixes).\n- chelsio/chtls: fix memory leaks caused by a race (git-fixes).\n- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).\n- chelsio/chtls: fix panic during unload reload chtls (git-fixes).\n- chelsio/chtls: fix socket lock (git-fixes).\n- chelsio/chtls: fix tls record info to user (git-fixes).\n- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).\n- chtls: Added a check to avoid NULL pointer dereference (git-fixes).\n- chtls: Fix chtls resources release sequence (git-fixes).\n- chtls: Fix hardware tid leak (git-fixes).\n- chtls: Fix panic when route to peer not configured (git-fixes).\n- chtls: Remove invalid set_tcb call (git-fixes).\n- chtls: Replace skb_dequeue with skb_peek (git-fixes).\n- cifs: check all path components in resolved dfs target (bsc#1181710).\n- cifs: fix nodfs mount option (bsc#1181710).\n- cifs: introduce helper for finding referral server (bsc#1181710).\n- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).\n- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).\n- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).\n- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).\n- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).\n- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).\n- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).\n- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).\n- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).\n- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).\n- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in ->remove() (git-fixes).\n- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).\n- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).\n- crypto: ecdh_helper - Ensure 'len >= secret.len' in decode_key() (git-fixes).\n- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).\n- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).\n- cxgb4: fix all-mask IP address comparison (git-fixes).\n- cxgb4: fix checks for max queues to allocate (git-fixes).\n- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).\n- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).\n- cxgb4: fix SGE queue dump destination buffer context (git-fixes).\n- cxgb4: fix the panic caused by non smac rewrite (git-fixes).\n- cxgb4: move DCB version extern to header file (git-fixes).\n- cxgb4: move handling L2T ARP failures to caller (git-fixes).\n- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).\n- cxgb4: parse TC-U32 key values and masks natively (git-fixes).\n- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).\n- cxgb4: set up filter action after rewrites (git-fixes).\n- cxgb4: use correct type for all-mask IP address comparison (git-fixes).\n- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).\n- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).\n- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).\n- dmaengine: hsu: disable spurious interrupt (git-fixes).\n- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).\n- dm crypt: avoid truncating the logical block size (git-fixes).\n- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).\n- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).\n- dm thin metadata: Avoid returning cmd->bm wild pointer on error (bsc#1177529).\n- dm thin metadata: fix lockdep complaint (bsc#1177529).\n- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).\n- dm: use noio when sending kobject event (bsc#1177529).\n- docs: filesystems: vfs: correct flag name (bsc#1182856).\n- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).\n- Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).\n- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).\n- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).\n- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).\n- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).\n- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).\n- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).\n- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).\n- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).\n- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).\n- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).\n- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).\n- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).\n- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).\n- drm/meson: Unbind all connectors on module removal (bsc#1152472)\n- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)\n- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)\n- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)\n- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)\n- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)\n- Drop HID logitech patch that caused a regression (bsc#1182259)\n- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).\n- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).\n- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).\n- ext4: fix a memory leak of ext4_free_data (bsc#1182447).\n- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).\n- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).\n- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).\n- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).\n- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).\n- firmware_loader: align .builtin_fw to 8 (git-fixes).\n- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).\n- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).\n- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).\n- gma500: clean up error handling in init (git-fixes).\n- gpio: pcf857x: Fix missing first interrupt (git-fixes).\n- HID: core: detect and skip invalid inputs to snto32() (git-fixes).\n- HID: make arrays usage and value to be the same (git-fixes).\n- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).\n- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).\n- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).\n- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).\n- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).\n- i2c: stm32f7: fix configuration of the digital filter (git-fixes).\n- i3c: master: dw: Drop redundant disec call (git-fixes).\n- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).\n- i40e: avoid premature Rx buffer reuse (git-fixes).\n- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).\n- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).\n- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).\n- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).\n- iavf: fix double-release of rtnl_lock (git-fixes).\n- iavf: fix error return code in iavf_init_get_resources() (git-fixes).\n- iavf: fix speed reporting over virtchnl (git-fixes).\n- iavf: Fix updating statistics (git-fixes).\n- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).\n- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).\n- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).\n- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: device remove has higher precedence over reset (bsc#1065729).\n- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).\n- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).\n- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).\n- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (jsc#SLE-17268).\n- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).\n- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: serialize access to work queue on remove (bsc#1065729).\n- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).\n- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).\n- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).\n- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).\n- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).\n- igc: fix link speed advertising (git-fixes).\n- igc: Fix returning wrong statistics (git-fixes).\n- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).\n- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).\n- include/linux/memremap.h: remove stale comments (git-fixes).\n- Input: elo - fix an error code in elo_connect() (git-fixes).\n- Input: i8042 - unbreak Pegatron C15B (git-fixes).\n- Input: joydev - prevent potential read overflow in ioctl (git-fixes).\n- Input: sur40 - fix an error code in sur40_probe() (git-fixes).\n- Input: xpad - sync supported devices with fork on GitHub (git-fixes).\n- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).\n- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).\n- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).\n- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).\n- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).\n- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).\n- iwlwifi: pcie: fix context info memory leak (git-fixes).\n- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).\n- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).\n- ixgbe: avoid premature Rx buffer reuse (git-fixes).\n- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).\n- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).\n- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.\n- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: add more data to CSD lock debugging (bsc#1180846).\n- kernel/smp: prepare more CSD lock debugging (bsc#1180846).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).\n- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).\n- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).\n- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).\n- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).\n- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).\n- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).\n- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).\n- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).\n- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).\n- KVM: x86: clear stale x86_emulate_ctxt->intercept value (bsc#1182381).\n- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).\n- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).\n- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).\n- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).\n- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).\n- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).\n- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).\n- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).\n- mac80211: fix fast-rx encryption check (git-fixes).\n- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).\n- mac80211: pause TX while changing interface type (git-fixes).\n- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.\n- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- matroxfb: avoid -Warray-bounds warning (bsc#1152472)\n- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).\n- media: camss: missing error code in msm_video_register() (git-fixes).\n- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).\n- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).\n- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).\n- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).\n- media: lmedm04: Fix misuse of comma (git-fixes).\n- media: media/pci: Fix memleak in empress_init (git-fixes).\n- media: mt9v111: Remove unneeded device-managed puts (git-fixes).\n- media: pwc: Use correct device for DMA (bsc#1181133).\n- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).\n- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).\n- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).\n- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).\n- media: vsp1: Fix an error handling path in the probe function (git-fixes).\n- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).\n- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).\n- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).\n- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).\n- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).\n- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).\n- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).\n- mlxsw: core: Fix memory leak on module removal (git-fixes).\n- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).\n- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).\n- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).\n- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).\n- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).\n- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).\n- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).\n- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).\n- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).\n- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).\n- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).\n- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).\n- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).\n- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).\n- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).\n- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).\n- net: axienet: Fix error return code in axienet_probe() (git-fixes).\n- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).\n- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).\n- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).\n- net: bcmgenet: set Rx mode before starting netif (git-fixes).\n- net: bcmgenet: use hardware padding of runt frames (git-fixes).\n- net: broadcom CNIC: requires MMU (git-fixes).\n- net: caif: Fix debugfs on 64-bit platforms (git-fixes).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).\n- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).\n- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).\n- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).\n- net: ethernet: ave: Fix error returns in ave_init (git-fixes).\n- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).\n- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).\n- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).\n- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).\n- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).\n- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).\n- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).\n- net: gro: do not keep too many GRO packets in napi->rx_list (bsc#1154353).\n- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).\n- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).\n- net: hns3: add reset check for VF updating port based VLAN (git-fixes).\n- net: hns3: clear port base VLAN when unload PF (git-fixes).\n- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).\n- net: hns3: fix a TX timeout issue (git-fixes).\n- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).\n- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).\n- net: hns3: fix for VLAN config when reset failed (git-fixes).\n- net: hns3: fix RSS config lost after VF reset (git-fixes).\n- net: hns3: fix set and get link ksettings issue (git-fixes).\n- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).\n- net: hns3: fix the number of queues actually used by ARQ (git-fixes).\n- net: hns3: fix use-after-free when doing self test (git-fixes).\n- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).\n- net: hns: fix return value check in __lb_other_process() (git-fixes).\n- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).\n- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).\n- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).\n- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix init_hca fields offset (git-fixes).\n- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).\n- net/mlx4_en: Handle TX error CQE (bsc#1181854).\n- net/mlx5: Add handling of port type in rule deletion (git-fixes).\n- net/mlx5: Annotate mutex destroy for root ns (git-fixes).\n- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).\n- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).\n- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).\n- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).\n- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).\n- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).\n- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).\n- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).\n- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).\n- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).\n- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).\n- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).\n- net/mlx5e: Fix error path of device attach (git-fixes).\n- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).\n- net/mlx5e: Fix two double free cases (git-fixes).\n- net/mlx5e: Fix VLAN cleanup flow (git-fixes).\n- net/mlx5e: Fix VLAN create flow (git-fixes).\n- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).\n- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).\n- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).\n- net/mlx5e: Reduce tc unsupported key print level (git-fixes).\n- net/mlx5e: Rename hw_modify to preactivate (git-fixes).\n- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).\n- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).\n- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).\n- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).\n- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).\n- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).\n- net/mlx5: Fix deletion of duplicate rules (git-fixes).\n- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).\n- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).\n- net/mlx5: Fix request_irqs error flow (git-fixes).\n- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).\n- net/mlx5: Query PPS pin operational status before registering it (git-fixes).\n- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).\n- net: moxa: Fix a potential double 'free_irq()' (git-fixes).\n- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).\n- net: mscc: ocelot: fix address ageing time (again) (git-fixes).\n- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).\n- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).\n- net: mvpp2: disable force link UP during port init procedure (git-fixes).\n- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).\n- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).\n- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).\n- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).\n- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).\n- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).\n- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).\n- net: octeon: mgmt: Repair filling of RX ring (git-fixes).\n- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).\n- net: phy: extract link partner advertisement reading (git-fixes).\n- net: phy: extract pause mode (git-fixes).\n- net: phy: marvell10g: fix null pointer dereference (git-fixes).\n- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).\n- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).\n- net: qca_spi: fix receive buffer size check (git-fixes).\n- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).\n- net: qede: fix PTP initialization on recovery (git-fixes).\n- net: qede: fix use-after-free on recovery and AER handling (git-fixes).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix async event callbacks unregistering (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix 'maybe uninitialized' warning (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qed: RDMA personality shouldn't fail VF load (git-fixes).\n- net: re-solve some conflicts after net -> net-next merge (bsc#1176855 ltc#187293).\n- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).\n- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).\n- net: rmnet: fix bridge mode bugs (git-fixes).\n- net: rmnet: fix lower interface leak (git-fixes).\n- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).\n- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).\n- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).\n- net: rmnet: fix suspicious RCU usage (git-fixes).\n- net: rmnet: print error message when command fails (git-fixes).\n- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).\n- net: rmnet: use upper/lower device infrastructure (git-fixes).\n- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).\n- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).\n- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).\n- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).\n- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).\n- net: stmmac: Do not accept invalid MTU values (git-fixes).\n- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).\n- net: stmmac: Enable 16KB buffer size (git-fixes).\n- net: stmmac: fix disabling flexible PPS output (git-fixes).\n- net: stmmac: fix length of PTP clock's name string (git-fixes).\n- net: stmmac: Fix the TX IOC in xmit path (git-fixes).\n- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).\n- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).\n- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).\n- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).\n- net: sun: fix missing release regions in cas_init_one() (git-fixes).\n- net: team: fix memory leak in __team_options_register (git-fixes).\n- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).\n- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).\n- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).\n- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).\n- nvme-multipath: Early exit if no path is available (bsc#1180964).\n- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).\n- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).\n- objtool: Do not fail on missing symbol table (bsc#1169514).\n- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).\n- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).\n- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).\n- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).\n- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).\n- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).\n- perf/x86/intel/uncore: With > 8 nodes, get pci bus die id from NUMA info (bsc#1180989).\n- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).\n- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).\n- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).\n- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).\n- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).\n- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).\n- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).\n- powerpc: Fix alignment bug within the init sections (bsc#1065729).\n- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).\n- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).\n- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).\n- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).\n- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).\n- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).\n- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).\n- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).\n- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).\n- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).\n- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).\n- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).\n- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).\n- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).\n- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).\n- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).\n- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).\n- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).\n- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).\n- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).\n- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).\n- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).\n- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).\n- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).\n- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).\n- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).\n- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).\n- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).\n- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).\n- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).\n- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).\n- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).\n- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).\n- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).\n- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).\n- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).\n- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).\n- qed: select CONFIG_CRC32 (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).\n- quota: Sanity-check quota file headers on load (bsc#1182461).\n- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).\n- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).\n- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)\n- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)\n- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)\n- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).\n- RDMA/efa: Count admin commands errors (bsc#1176248).\n- RDMA/efa: Count mmap failures (bsc#1176248).\n- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).\n- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).\n- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).\n- RDMA/efa: Expose minimum SQ size (bsc#1176248).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).\n- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).\n- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).\n- RDMA/efa: Report create CQ error counter (bsc#1176248).\n- RDMA/efa: Report host information to the device (bsc#1176248).\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).\n- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).\n- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).\n- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).\n- regulator: axp20x: Fix reference cout leak (git-fixes).\n- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).\n- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).\n- regulator: Fix lockdep warning resolving supplies (git-fixes).\n- regulator: s5m8767: Drop regulators OF node reference (git-fixes).\n- regulator: s5m8767: Fix reference count leak (git-fixes).\n- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).\n- Remove debug patch for boot failure (bsc#1182602 ltc#190924). \n- reset: hisilicon: correct vendor prefix (git-fixes).\n- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).\n- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).\n- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).\n- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)\n- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)\n- rtc: s5m: select REGMAP_I2C (git-fixes).\n- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).\n- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).\n- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).\n- sched: Reenable interrupts in do_sched_yield() (git-fixes)\n- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).\n- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).\n- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).\n- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).\n- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).\n- smsc95xx: check return value of smsc95xx_reset (git-fixes).\n- soc: aspeed: snoop: Add clock control logic (git-fixes).\n- spi: atmel: Put allocated master before return (git-fixes).\n- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).\n- spi: spi-synquacer: fix set_cs handling (git-fixes).\n- spi: stm32: properly handle 0 byte transfer (git-fixes).\n- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).\n- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).\n- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).\n- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).\n- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).\n- team: set dev->needed_headroom in team_setup_by_port() (git-fixes).\n- tpm: Remove tpm_dev_wq_lock (git-fixes).\n- tpm_tis: Clean up locality release (git-fixes).\n- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).\n- tracing: Check length before giving out the filter buffer (git-fixes).\n- tracing: Do not count ftrace events in top level enable output (git-fixes).\n- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).\n- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).\n- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).\n- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).\n- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).\n- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).\n- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).\n- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455). \n- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).\n- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).\n- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)\n- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).\n- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).\n- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).\n- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).\n- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).\n- USB: gadget: u_audio: Free requests only after callback (git-fixes).\n- USB: musb: Fix runtime PM race in musb_queue_resume_work (git-fixes).\n- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).\n- USB: quirks: sort quirk entries (git-fixes).\n- USB: renesas_usbhs: Clear pipe running flag in usbhs_pkt_pop() (git-fixes).\n- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).\n- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).\n- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).\n- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).\n- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).\n- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).\n- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).\n- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).\n- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).\n- virtio_net: Fix error code in probe() (git-fixes).\n- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).\n- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).\n- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).\n- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).\n- vxlan: fix memleak of fdb (git-fixes).\n- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).\n- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).\n- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).\n- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).\n- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).\n- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).\n- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).\n- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).\n- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).\n- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).\n- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).\n- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).\n- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).\n- xfs: ratelimit xfs_discard_page messages (bsc#1182283).\n- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).\n- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).\n- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).\n- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).\n- xhci: fix bounce buffer usage for non-sg list case (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-738,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-738", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0738-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0738-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210738-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0738-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1078720", url: "https://bugzilla.suse.com/1078720", }, { category: "self", summary: "SUSE Bug 1081134", url: "https://bugzilla.suse.com/1081134", }, { category: "self", summary: "SUSE Bug 1084610", url: "https://bugzilla.suse.com/1084610", }, { category: "self", summary: "SUSE Bug 1132477", url: "https://bugzilla.suse.com/1132477", }, { category: "self", summary: "SUSE Bug 1151927", url: "https://bugzilla.suse.com/1151927", }, { category: "self", summary: "SUSE Bug 1152472", url: "https://bugzilla.suse.com/1152472", }, { category: "self", summary: "SUSE Bug 1152489", url: "https://bugzilla.suse.com/1152489", }, { category: "self", summary: "SUSE Bug 1154353", url: "https://bugzilla.suse.com/1154353", }, { category: "self", summary: "SUSE Bug 1155518", url: "https://bugzilla.suse.com/1155518", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1163776", url: "https://bugzilla.suse.com/1163776", }, { category: "self", summary: "SUSE Bug 1169514", url: "https://bugzilla.suse.com/1169514", }, { category: "self", summary: "SUSE Bug 1170442", url: "https://bugzilla.suse.com/1170442", }, { category: "self", summary: "SUSE Bug 1176248", url: "https://bugzilla.suse.com/1176248", }, { category: "self", summary: "SUSE Bug 1176855", url: "https://bugzilla.suse.com/1176855", }, { category: "self", summary: "SUSE Bug 1177109", url: "https://bugzilla.suse.com/1177109", }, { category: "self", summary: "SUSE Bug 1177326", url: "https://bugzilla.suse.com/1177326", }, { category: "self", summary: "SUSE Bug 1177440", url: "https://bugzilla.suse.com/1177440", }, { category: "self", summary: "SUSE Bug 1177529", url: "https://bugzilla.suse.com/1177529", }, { category: "self", summary: "SUSE Bug 1178142", url: "https://bugzilla.suse.com/1178142", }, { category: "self", summary: "SUSE Bug 1178995", url: "https://bugzilla.suse.com/1178995", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179137", url: "https://bugzilla.suse.com/1179137", }, { category: "self", summary: "SUSE Bug 1179243", url: "https://bugzilla.suse.com/1179243", }, { category: "self", summary: "SUSE Bug 1179428", url: "https://bugzilla.suse.com/1179428", }, { category: "self", summary: "SUSE Bug 1179660", url: "https://bugzilla.suse.com/1179660", }, { category: "self", summary: "SUSE Bug 1179929", url: "https://bugzilla.suse.com/1179929", }, { category: "self", summary: "SUSE Bug 1180058", url: "https://bugzilla.suse.com/1180058", }, { category: "self", summary: "SUSE Bug 1180846", url: "https://bugzilla.suse.com/1180846", }, { category: "self", summary: "SUSE Bug 1180964", url: "https://bugzilla.suse.com/1180964", }, { category: "self", summary: "SUSE Bug 1180989", url: "https://bugzilla.suse.com/1180989", }, { category: "self", summary: "SUSE Bug 1181133", url: "https://bugzilla.suse.com/1181133", }, { category: "self", summary: "SUSE Bug 1181259", url: "https://bugzilla.suse.com/1181259", }, { category: "self", summary: "SUSE Bug 1181544", url: "https://bugzilla.suse.com/1181544", }, { category: "self", summary: "SUSE Bug 1181574", url: "https://bugzilla.suse.com/1181574", }, { category: "self", summary: "SUSE Bug 1181637", url: "https://bugzilla.suse.com/1181637", }, { category: "self", summary: "SUSE Bug 1181655", url: "https://bugzilla.suse.com/1181655", }, { category: "self", summary: "SUSE Bug 1181671", url: "https://bugzilla.suse.com/1181671", }, { category: "self", summary: "SUSE Bug 1181674", url: "https://bugzilla.suse.com/1181674", }, { category: "self", summary: "SUSE Bug 1181710", url: "https://bugzilla.suse.com/1181710", }, { category: "self", summary: "SUSE Bug 1181720", url: "https://bugzilla.suse.com/1181720", }, { category: "self", summary: "SUSE Bug 1181735", url: "https://bugzilla.suse.com/1181735", }, { category: "self", summary: "SUSE Bug 1181736", url: "https://bugzilla.suse.com/1181736", }, { category: "self", summary: "SUSE Bug 1181738", url: "https://bugzilla.suse.com/1181738", }, { category: "self", summary: "SUSE Bug 1181747", url: "https://bugzilla.suse.com/1181747", }, { category: "self", summary: "SUSE Bug 1181753", url: "https://bugzilla.suse.com/1181753", }, { category: "self", summary: "SUSE Bug 1181818", url: "https://bugzilla.suse.com/1181818", }, { category: "self", summary: "SUSE Bug 1181843", url: "https://bugzilla.suse.com/1181843", }, { category: "self", summary: "SUSE Bug 1181854", url: "https://bugzilla.suse.com/1181854", }, { category: "self", summary: "SUSE Bug 1181896", url: "https://bugzilla.suse.com/1181896", }, { category: "self", summary: "SUSE Bug 1181958", url: "https://bugzilla.suse.com/1181958", }, { category: "self", summary: "SUSE Bug 1181960", url: "https://bugzilla.suse.com/1181960", }, { category: "self", summary: "SUSE Bug 1181985", url: "https://bugzilla.suse.com/1181985", }, { category: "self", summary: "SUSE Bug 1182047", url: "https://bugzilla.suse.com/1182047", }, { category: "self", summary: "SUSE Bug 1182118", url: "https://bugzilla.suse.com/1182118", }, { category: "self", summary: "SUSE Bug 1182128", url: "https://bugzilla.suse.com/1182128", }, { category: "self", summary: "SUSE Bug 1182140", url: "https://bugzilla.suse.com/1182140", }, { category: "self", summary: "SUSE Bug 1182171", url: "https://bugzilla.suse.com/1182171", }, { category: "self", summary: "SUSE Bug 1182175", url: "https://bugzilla.suse.com/1182175", }, { category: "self", summary: "SUSE Bug 1182259", url: "https://bugzilla.suse.com/1182259", }, { category: "self", summary: "SUSE Bug 1182265", url: "https://bugzilla.suse.com/1182265", }, { category: "self", summary: "SUSE Bug 1182266", url: "https://bugzilla.suse.com/1182266", }, { category: "self", summary: "SUSE Bug 1182267", url: "https://bugzilla.suse.com/1182267", }, { category: "self", summary: "SUSE Bug 1182268", url: "https://bugzilla.suse.com/1182268", }, { category: "self", summary: "SUSE Bug 1182271", url: "https://bugzilla.suse.com/1182271", }, { category: "self", summary: "SUSE Bug 1182272", url: "https://bugzilla.suse.com/1182272", }, { category: "self", summary: "SUSE Bug 1182273", url: "https://bugzilla.suse.com/1182273", }, { category: "self", summary: "SUSE Bug 1182275", url: "https://bugzilla.suse.com/1182275", }, { category: "self", summary: "SUSE Bug 1182276", url: "https://bugzilla.suse.com/1182276", }, { category: "self", summary: "SUSE Bug 1182278", url: "https://bugzilla.suse.com/1182278", }, { category: "self", summary: "SUSE Bug 1182283", url: "https://bugzilla.suse.com/1182283", }, { category: "self", summary: "SUSE Bug 1182374", url: "https://bugzilla.suse.com/1182374", }, { category: "self", summary: "SUSE Bug 1182380", url: "https://bugzilla.suse.com/1182380", }, { category: "self", summary: "SUSE Bug 1182381", url: "https://bugzilla.suse.com/1182381", }, { category: "self", summary: "SUSE Bug 1182406", url: "https://bugzilla.suse.com/1182406", }, { category: "self", summary: "SUSE Bug 1182430", url: "https://bugzilla.suse.com/1182430", }, { category: "self", summary: "SUSE Bug 1182439", url: "https://bugzilla.suse.com/1182439", }, { category: "self", summary: "SUSE Bug 1182441", url: "https://bugzilla.suse.com/1182441", }, { category: "self", summary: "SUSE Bug 1182442", url: "https://bugzilla.suse.com/1182442", }, { category: "self", summary: "SUSE Bug 1182443", url: "https://bugzilla.suse.com/1182443", }, { category: "self", summary: "SUSE Bug 1182444", url: "https://bugzilla.suse.com/1182444", }, { category: "self", summary: "SUSE Bug 1182445", url: "https://bugzilla.suse.com/1182445", }, { category: "self", summary: "SUSE Bug 1182446", url: "https://bugzilla.suse.com/1182446", }, { category: "self", summary: "SUSE Bug 1182447", url: "https://bugzilla.suse.com/1182447", }, { category: "self", summary: "SUSE Bug 1182449", url: "https://bugzilla.suse.com/1182449", }, { category: "self", summary: "SUSE Bug 1182454", url: "https://bugzilla.suse.com/1182454", }, { category: "self", summary: "SUSE Bug 1182455", url: "https://bugzilla.suse.com/1182455", }, { category: "self", summary: "SUSE Bug 1182456", url: "https://bugzilla.suse.com/1182456", }, { category: "self", summary: "SUSE Bug 1182457", url: "https://bugzilla.suse.com/1182457", }, { category: "self", summary: "SUSE Bug 1182458", url: "https://bugzilla.suse.com/1182458", }, { category: "self", summary: "SUSE Bug 1182459", url: "https://bugzilla.suse.com/1182459", }, { category: "self", summary: "SUSE Bug 1182460", url: "https://bugzilla.suse.com/1182460", }, { category: "self", summary: "SUSE Bug 1182461", url: "https://bugzilla.suse.com/1182461", }, { category: "self", summary: "SUSE Bug 1182462", url: "https://bugzilla.suse.com/1182462", }, { category: "self", summary: "SUSE Bug 1182463", url: "https://bugzilla.suse.com/1182463", }, { category: "self", summary: "SUSE Bug 1182464", url: "https://bugzilla.suse.com/1182464", }, { category: "self", summary: "SUSE Bug 1182465", url: "https://bugzilla.suse.com/1182465", }, { category: "self", summary: "SUSE Bug 1182466", url: "https://bugzilla.suse.com/1182466", }, { category: "self", summary: "SUSE Bug 1182485", url: "https://bugzilla.suse.com/1182485", }, { category: "self", summary: "SUSE Bug 1182489", url: "https://bugzilla.suse.com/1182489", }, { category: "self", summary: "SUSE Bug 1182490", url: "https://bugzilla.suse.com/1182490", }, { category: "self", summary: "SUSE Bug 1182547", url: "https://bugzilla.suse.com/1182547", }, { category: "self", summary: "SUSE Bug 1182558", url: "https://bugzilla.suse.com/1182558", }, { category: "self", summary: "SUSE Bug 1182560", url: "https://bugzilla.suse.com/1182560", }, { category: "self", summary: "SUSE Bug 1182561", url: "https://bugzilla.suse.com/1182561", }, { category: "self", summary: "SUSE Bug 1182571", url: "https://bugzilla.suse.com/1182571", }, { category: "self", summary: "SUSE Bug 1182599", url: "https://bugzilla.suse.com/1182599", }, { category: "self", summary: "SUSE Bug 1182602", url: "https://bugzilla.suse.com/1182602", }, { category: "self", summary: "SUSE Bug 1182626", url: "https://bugzilla.suse.com/1182626", }, { category: "self", summary: "SUSE Bug 1182650", url: "https://bugzilla.suse.com/1182650", }, { category: "self", summary: "SUSE Bug 1182672", url: "https://bugzilla.suse.com/1182672", }, { category: "self", summary: "SUSE Bug 1182676", url: "https://bugzilla.suse.com/1182676", }, { category: "self", summary: "SUSE Bug 1182683", url: "https://bugzilla.suse.com/1182683", }, { category: "self", summary: "SUSE Bug 1182684", url: "https://bugzilla.suse.com/1182684", }, { category: "self", summary: "SUSE Bug 1182686", url: "https://bugzilla.suse.com/1182686", }, { category: "self", summary: "SUSE Bug 1182770", url: "https://bugzilla.suse.com/1182770", }, { category: "self", summary: "SUSE Bug 1182798", url: "https://bugzilla.suse.com/1182798", }, { category: "self", summary: "SUSE Bug 1182800", url: "https://bugzilla.suse.com/1182800", }, { category: "self", summary: "SUSE Bug 1182801", url: "https://bugzilla.suse.com/1182801", }, { category: "self", summary: "SUSE Bug 1182854", url: "https://bugzilla.suse.com/1182854", }, { category: "self", summary: "SUSE Bug 1182856", url: "https://bugzilla.suse.com/1182856", }, { category: "self", summary: "SUSE CVE CVE-2020-12362 page", url: "https://www.suse.com/security/cve/CVE-2020-12362/", }, { category: "self", summary: "SUSE CVE CVE-2020-12363 page", url: "https://www.suse.com/security/cve/CVE-2020-12363/", }, { category: "self", summary: "SUSE CVE CVE-2020-12364 page", url: "https://www.suse.com/security/cve/CVE-2020-12364/", }, { category: "self", summary: "SUSE CVE CVE-2020-12373 page", url: "https://www.suse.com/security/cve/CVE-2020-12373/", }, { category: "self", summary: "SUSE CVE CVE-2020-29368 page", url: "https://www.suse.com/security/cve/CVE-2020-29368/", }, { category: "self", summary: "SUSE CVE CVE-2020-29374 page", url: "https://www.suse.com/security/cve/CVE-2020-29374/", }, { category: "self", summary: "SUSE CVE CVE-2021-26930 page", url: "https://www.suse.com/security/cve/CVE-2021-26930/", }, { category: "self", summary: "SUSE CVE CVE-2021-26931 page", url: "https://www.suse.com/security/cve/CVE-2021-26931/", }, { category: "self", summary: "SUSE CVE CVE-2021-26932 page", url: "https://www.suse.com/security/cve/CVE-2021-26932/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-03-09T15:08:32Z", generator: { date: "2021-03-09T15:08:32Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0738-1", initial_release_date: "2021-03-09T15:08:32Z", revision_history: [ { date: "2021-03-09T15:08:32Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-5.3.18-18.38.1.noarch", product: { name: "kernel-devel-azure-5.3.18-18.38.1.noarch", product_id: "kernel-devel-azure-5.3.18-18.38.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.3.18-18.38.1.noarch", product: { name: "kernel-source-azure-5.3.18-18.38.1.noarch", product_id: "kernel-source-azure-5.3.18-18.38.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.3.18-18.38.1.x86_64", product: { name: "cluster-md-kmp-azure-5.3.18-18.38.1.x86_64", product_id: "cluster-md-kmp-azure-5.3.18-18.38.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.3.18-18.38.1.x86_64", product: { name: "dlm-kmp-azure-5.3.18-18.38.1.x86_64", product_id: "dlm-kmp-azure-5.3.18-18.38.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.3.18-18.38.1.x86_64", product: { name: "gfs2-kmp-azure-5.3.18-18.38.1.x86_64", product_id: "gfs2-kmp-azure-5.3.18-18.38.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.3.18-18.38.1.x86_64", product: { name: "kernel-azure-5.3.18-18.38.1.x86_64", product_id: "kernel-azure-5.3.18-18.38.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.3.18-18.38.1.x86_64", product: { name: "kernel-azure-devel-5.3.18-18.38.1.x86_64", product_id: "kernel-azure-devel-5.3.18-18.38.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.3.18-18.38.1.x86_64", product: { name: "kernel-azure-extra-5.3.18-18.38.1.x86_64", product_id: "kernel-azure-extra-5.3.18-18.38.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.3.18-18.38.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.3.18-18.38.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.3.18-18.38.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.3.18-18.38.1.x86_64", product: { name: "kernel-syms-azure-5.3.18-18.38.1.x86_64", product_id: "kernel-syms-azure-5.3.18-18.38.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.3.18-18.38.1.x86_64", product: { name: "kselftests-kmp-azure-5.3.18-18.38.1.x86_64", product_id: "kselftests-kmp-azure-5.3.18-18.38.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.3.18-18.38.1.x86_64", product: { name: "ocfs2-kmp-azure-5.3.18-18.38.1.x86_64", product_id: "ocfs2-kmp-azure-5.3.18-18.38.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.3.18-18.38.1.x86_64", product: { name: "reiserfs-kmp-azure-5.3.18-18.38.1.x86_64", product_id: "reiserfs-kmp-azure-5.3.18-18.38.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.3.18-18.38.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", }, product_reference: "kernel-azure-5.3.18-18.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.3.18-18.38.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", }, product_reference: "kernel-azure-devel-5.3.18-18.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.3.18-18.38.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", }, product_reference: "kernel-devel-azure-5.3.18-18.38.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.3.18-18.38.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", }, product_reference: "kernel-source-azure-5.3.18-18.38.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.3.18-18.38.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", }, product_reference: "kernel-syms-azure-5.3.18-18.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2020-12362", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12362", }, ], notes: [ { category: "general", text: "Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12362", url: "https://www.suse.com/security/cve/CVE-2020-12362", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12362", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1182033 for CVE-2020-12362", url: "https://bugzilla.suse.com/1182033", }, { category: "external", summary: "SUSE Bug 1190859 for CVE-2020-12362", url: "https://bugzilla.suse.com/1190859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:32Z", details: "important", }, ], title: "CVE-2020-12362", }, { cve: "CVE-2020-12363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12363", }, ], notes: [ { category: "general", text: "Improper input validation in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12363", url: "https://www.suse.com/security/cve/CVE-2020-12363", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12363", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1181735 for CVE-2020-12363", url: "https://bugzilla.suse.com/1181735", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:32Z", details: "low", }, ], title: "CVE-2020-12363", }, { cve: "CVE-2020-12364", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12364", }, ], notes: [ { category: "general", text: "Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12364", url: "https://www.suse.com/security/cve/CVE-2020-12364", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12364", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1181736 for CVE-2020-12364", url: "https://bugzilla.suse.com/1181736", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:32Z", details: "low", }, ], title: "CVE-2020-12364", }, { cve: "CVE-2020-12373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12373", }, ], notes: [ { category: "general", text: "Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12373", url: "https://www.suse.com/security/cve/CVE-2020-12373", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12373", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1181738 for CVE-2020-12373", url: "https://bugzilla.suse.com/1181738", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:32Z", details: "low", }, ], title: "CVE-2020-12373", }, { cve: "CVE-2020-29368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29368", }, ], notes: [ { category: "general", text: "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29368", url: "https://www.suse.com/security/cve/CVE-2020-29368", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179660", }, { category: "external", summary: "SUSE Bug 1179664 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:32Z", details: "moderate", }, ], title: "CVE-2020-29368", }, { cve: "CVE-2020-29374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29374", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29374", url: "https://www.suse.com/security/cve/CVE-2020-29374", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:32Z", details: "low", }, ], title: "CVE-2020-29374", }, { cve: "CVE-2021-26930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26930", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26930", url: "https://www.suse.com/security/cve/CVE-2021-26930", }, { category: "external", summary: "SUSE Bug 1181843 for CVE-2021-26930", url: "https://bugzilla.suse.com/1181843", }, { category: "external", summary: "SUSE Bug 1182294 for CVE-2021-26930", url: "https://bugzilla.suse.com/1182294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:32Z", details: "important", }, ], title: "CVE-2021-26930", }, { cve: "CVE-2021-26931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26931", url: "https://www.suse.com/security/cve/CVE-2021-26931", }, { category: "external", summary: "SUSE Bug 1181753 for CVE-2021-26931", url: "https://bugzilla.suse.com/1181753", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-26931", url: "https://bugzilla.suse.com/1183022", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:32Z", details: "moderate", }, ], title: "CVE-2021-26931", }, { cve: "CVE-2021-26932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26932", url: "https://www.suse.com/security/cve/CVE-2021-26932", }, { category: "external", summary: "SUSE Bug 1181747 for CVE-2021-26932", url: "https://bugzilla.suse.com/1181747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:08:32Z", details: "moderate", }, ], title: "CVE-2021-26932", }, ], }
suse-su-2021:0741-1
Vulnerability from csaf_suse
Published
2021-03-09 15:12
Modified
2021-03-09 15:12
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially
enable an escalation of privilege via local access (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially
enable a denial of service via local access (bsc#1181735).
- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially
enable a denial of service via local access (bsc#1181736 ).
- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user
to potentially enable a denial of service via local access (bsc#1181738).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access
because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).
The following non-security bugs were fixed:
- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).
- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).
- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).
- ALSA: pcm: Call sync_stop at disconnection (git-fixes).
- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).
- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).
- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).
- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).
- ALSA: usb-audio: More strict state change in EP (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cpcap: fix microphone timeslot mask (git-fixes).
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ASoC: simple-card-utils: Fix device module clock (git-fixes).
- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).
- ata: ahci_brcm: Add back regulators management (git-fixes).
- ata: sata_nv: Fix retrieving of active qcs (git-fixes).
- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- bcache: fix overflow in offset_to_stripe() (git-fixes).
- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).
- blk-mq: insert request not through ->queue_rq into sw/scheduler queue (bsc#1182443).
- blk-mq: move cancel of hctx->run_work to the front of blk_exit_queue (bsc#1182444).
- block: fix inflight statistics of part0 (bsc#1182445).
- block: respect queue limit of max discard segment (bsc#1182441).
- block: virtio_blk: fix handling single range discard request (bsc#1182439).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bnxt_en: Fix accumulation of bp->net_stats_prev (git-fixes).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: set dev->needed_headroom in bond_setup_by_slave() (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).
- bpf, cgroup: Fix problematic bounds check (bsc#1155518).
- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).
- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).
- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- ceph: fix flush_snap logic after putting caps (bsc#1182854).
- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).
- cgroup: fix psi monitor for root cgroup (bsc#1182686).
- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).
- chelsio/chtls: correct function return and return type (git-fixes).
- chelsio/chtls: correct netdevice for vlan interface (git-fixes).
- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).
- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).
- chelsio/chtls: fix deadlock issue (git-fixes).
- chelsio/chtls: fix memory leaks caused by a race (git-fixes).
- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).
- chelsio/chtls: fix panic during unload reload chtls (git-fixes).
- chelsio/chtls: fix socket lock (git-fixes).
- chelsio/chtls: fix tls record info to user (git-fixes).
- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).
- chtls: Added a check to avoid NULL pointer dereference (git-fixes).
- chtls: Fix chtls resources release sequence (git-fixes).
- chtls: Fix hardware tid leak (git-fixes).
- chtls: Fix panic when route to peer not configured (git-fixes).
- chtls: Remove invalid set_tcb call (git-fixes).
- chtls: Replace skb_dequeue with skb_peek (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).
- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).
- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).
- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).
- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).
- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).
- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).
- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in ->remove() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).
- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).
- crypto: ecdh_helper - Ensure 'len >= secret.len' in decode_key() (git-fixes).
- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4: fix all-mask IP address comparison (git-fixes).
- cxgb4: fix checks for max queues to allocate (git-fixes).
- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).
- cxgb4: fix SGE queue dump destination buffer context (git-fixes).
- cxgb4: fix the panic caused by non smac rewrite (git-fixes).
- cxgb4: move DCB version extern to header file (git-fixes).
- cxgb4: move handling L2T ARP failures to caller (git-fixes).
- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).
- cxgb4: parse TC-U32 key values and masks natively (git-fixes).
- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).
- cxgb4: set up filter action after rewrites (git-fixes).
- cxgb4: use correct type for all-mask IP address comparison (git-fixes).
- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).
- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).
- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).
- dm crypt: avoid truncating the logical block size (git-fixes).
- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).
- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).
- dm thin metadata: Avoid returning cmd->bm wild pointer on error (bsc#1177529).
- dm thin metadata: fix lockdep complaint (bsc#1177529).
- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).
- dm: use noio when sending kobject event (bsc#1177529).
- docs: filesystems: vfs: correct flag name (bsc#1182856).
- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).
- drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).
- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).
- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).
- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).
- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).
- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).
- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).
- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).
- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).
- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).
- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).
- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).
- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).
- drm/meson: Unbind all connectors on module removal (bsc#1152472)
- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)
- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)
- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)
- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)
- Drop HID logitech patch that caused a regression (bsc#1182259)
- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).
- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware_loader: align .builtin_fw to 8 (git-fixes).
- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).
- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- gma500: clean up error handling in init (git-fixes).
- gpio: pcf857x: Fix missing first interrupt (git-fixes).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).
- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).
- i2c: stm32f7: fix configuration of the digital filter (git-fixes).
- i3c: master: dw: Drop redundant disec call (git-fixes).
- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).
- i40e: avoid premature Rx buffer reuse (git-fixes).
- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).
- iavf: fix double-release of rtnl_lock (git-fixes).
- iavf: fix error return code in iavf_init_get_resources() (git-fixes).
- iavf: fix speed reporting over virtchnl (git-fixes).
- iavf: Fix updating statistics (git-fixes).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).
- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).
- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).
- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).
- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).
- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).
- igc: fix link speed advertising (git-fixes).
- igc: Fix returning wrong statistics (git-fixes).
- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).
- include/linux/memremap.h: remove stale comments (git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- Input: sur40 - fix an error code in sur40_probe() (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).
- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).
- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).
- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).
- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).
- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).
- iwlwifi: pcie: fix context info memory leak (git-fixes).
- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).
- ixgbe: avoid premature Rx buffer reuse (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).
- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).
- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).
- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).
- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).
- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).
- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).
- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).
- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).
- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).
- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).
- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).
- KVM: x86: clear stale x86_emulate_ctxt->intercept value (bsc#1182381).
- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).
- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).
- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).
- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).
- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).
- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).
- mac80211: fix fast-rx encryption check (git-fixes).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- mac80211: pause TX while changing interface type (git-fixes).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.
- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).
- matroxfb: avoid -Warray-bounds warning (bsc#1152472)
- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).
- media: camss: missing error code in msm_video_register() (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).
- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).
- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).
- media: lmedm04: Fix misuse of comma (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: mt9v111: Remove unneeded device-managed puts (git-fixes).
- media: pwc: Use correct device for DMA (bsc#1181133).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).
- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).
- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).
- mlxsw: core: Fix memory leak on module removal (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).
- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).
- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).
- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).
- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).
- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).
- net: axienet: Fix error return code in axienet_probe() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use hardware padding of runt frames (git-fixes).
- net: broadcom CNIC: requires MMU (git-fixes).
- net: caif: Fix debugfs on 64-bit platforms (git-fixes).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).
- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).
- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: ave: Fix error returns in ave_init (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).
- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).
- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).
- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).
- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).
- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gro: do not keep too many GRO packets in napi->rx_list (bsc#1154353).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).
- net: hns3: add reset check for VF updating port based VLAN (git-fixes).
- net: hns3: clear port base VLAN when unload PF (git-fixes).
- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).
- net: hns3: fix a TX timeout issue (git-fixes).
- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).
- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).
- net: hns3: fix for VLAN config when reset failed (git-fixes).
- net: hns3: fix RSS config lost after VF reset (git-fixes).
- net: hns3: fix set and get link ksettings issue (git-fixes).
- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).
- net: hns3: fix the number of queues actually used by ARQ (git-fixes).
- net: hns3: fix use-after-free when doing self test (git-fixes).
- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).
- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).
- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix init_hca fields offset (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net/mlx5: Add handling of port type in rule deletion (git-fixes).
- net/mlx5: Annotate mutex destroy for root ns (git-fixes).
- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).
- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).
- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).
- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).
- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).
- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).
- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (git-fixes).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).
- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).
- net/mlx5e: Reduce tc unsupported key print level (git-fixes).
- net/mlx5e: Rename hw_modify to preactivate (git-fixes).
- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).
- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).
- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).
- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net/mlx5: Fix deletion of duplicate rules (git-fixes).
- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).
- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).
- net/mlx5: Fix request_irqs error flow (git-fixes).
- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).
- net/mlx5: Query PPS pin operational status before registering it (git-fixes).
- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).
- net: mscc: ocelot: fix address ageing time (again) (git-fixes).
- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).
- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
- net: mvpp2: disable force link UP during port init procedure (git-fixes).
- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).
- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).
- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).
- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).
- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).
- net: octeon: mgmt: Repair filling of RX ring (git-fixes).
- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).
- net: phy: extract link partner advertisement reading (git-fixes).
- net: phy: extract pause mode (git-fixes).
- net: phy: marvell10g: fix null pointer dereference (git-fixes).
- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).
- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).
- net: qca_spi: fix receive buffer size check (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: qede: fix PTP initialization on recovery (git-fixes).
- net: qede: fix use-after-free on recovery and AER handling (git-fixes).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix async event callbacks unregistering (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: re-solve some conflicts after net -> net-next merge (bsc#1176855 ltc#187293).
- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).
- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).
- net: rmnet: fix bridge mode bugs (git-fixes).
- net: rmnet: fix lower interface leak (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).
- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).
- net: rmnet: fix suspicious RCU usage (git-fixes).
- net: rmnet: print error message when command fails (git-fixes).
- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).
- net: rmnet: use upper/lower device infrastructure (git-fixes).
- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: fix disabling flexible PPS output (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: Fix the TX IOC in xmit path (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).
- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).
- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).
- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).
- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).
- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).
- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).
- perf/x86/intel/uncore: With > 8 nodes, get pci bus die id from NUMA info (bsc#1180989).
- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).
- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).
- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).
- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).
- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).
- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).
- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).
- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).
- qed: select CONFIG_CRC32 (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).
- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).
- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)
- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)
- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)
- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).
- RDMA/efa: Count admin commands errors (bsc#1176248).
- RDMA/efa: Count mmap failures (bsc#1176248).
- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).
- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).
- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).
- RDMA/efa: Expose minimum SQ size (bsc#1176248).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).
- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).
- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).
- RDMA/efa: Report create CQ error counter (bsc#1176248).
- RDMA/efa: Report host information to the device (bsc#1176248).
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).
- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).
- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).
- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).
- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).
- regulator: Fix lockdep warning resolving supplies (git-fixes).
- regulator: s5m8767: Drop regulators OF node reference (git-fixes).
- regulator: s5m8767: Fix reference count leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- reset: hisilicon: correct vendor prefix (git-fixes).
- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).
- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).
- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).
- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- rtc: s5m: select REGMAP_I2C (git-fixes).
- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).
- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).
- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).
- sched: Reenable interrupts in do_sched_yield() (git-fixes)
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).
- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).
- smsc95xx: check return value of smsc95xx_reset (git-fixes).
- soc: aspeed: snoop: Add clock control logic (git-fixes).
- spi: atmel: Put allocated master before return (git-fixes).
- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).
- spi: spi-synquacer: fix set_cs handling (git-fixes).
- spi: stm32: properly handle 0 byte transfer (git-fixes).
- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).
- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).
- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).
- team: set dev->needed_headroom in team_setup_by_port() (git-fixes).
- tpm: Remove tpm_dev_wq_lock (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).
- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).
- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).
- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).
- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).
- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).
- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455).
- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).
- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).
- USB: gadget: u_audio: Free requests only after callback (git-fixes).
- USB: mUSB: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: quirks: sort quirk entries (git-fixes).
- USB: renesas_usbhs: Clear pipe running flag in USBhs_pkt_pop() (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).
- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).
- virtio_net: Fix error code in probe() (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- vxlan: fix memleak of fdb (git-fixes).
- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).
- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).
- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).
- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).
- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).
- xfs: ratelimit xfs_discard_page messages (bsc#1182283).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).
- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).
- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).
The kernel-default-base packaging was changed:
- Added squashfs for kiwi installiso support (bsc#1182341)
- Added fuse (bsc#1182507)
- Added modules which got lost when migrating away from supported.conf (bsc#1182110):
* am53c974 had a typo
* cls_bpf, iscsi_ibft, libahci, libata, openvswitch, sch_ingress
- Also added vport-* modules for Open vSwitch
Patchnames
SUSE-2021-741,SUSE-SLE-Module-Basesystem-15-SP2-2021-741,SUSE-SLE-Module-Development-Tools-15-SP2-2021-741,SUSE-SLE-Module-Legacy-15-SP2-2021-741,SUSE-SLE-Module-Live-Patching-15-SP2-2021-741,SUSE-SLE-Product-HA-15-SP2-2021-741,SUSE-SLE-Product-WE-15-SP2-2021-741,SUSE-SUSE-MicroOS-5.0-2021-741
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).\n- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).\n- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).\n by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).\n- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially \n enable an escalation of privilege via local access (bsc#1181720).\n- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially \n enable a denial of service via local access (bsc#1181735).\n- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially \n enable a denial of service via local access (bsc#1181736 ).\n- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user \n to potentially enable a denial of service via local access (bsc#1181738).\n- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access \n because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).\n\nThe following non-security bugs were fixed:\n\n- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).\n- ACPI: property: Fix fwnode string properties matching (git-fixes).\n- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).\n- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).\n- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).\n- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).\n- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).\n- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).\n- ALSA: pcm: Call sync_stop at disconnection (git-fixes).\n- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).\n- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).\n- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).\n- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).\n- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).\n- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).\n- ALSA: usb-audio: More strict state change in EP (git-fixes).\n- amba: Fix resource leak for drivers without .remove (git-fixes).\n- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)\n- ASoC: cpcap: fix microphone timeslot mask (git-fixes).\n- ASoC: cs42l56: fix up error handling in probe (git-fixes).\n- ASoC: simple-card-utils: Fix device module clock (git-fixes).\n- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).\n- ata: ahci_brcm: Add back regulators management (git-fixes).\n- ata: sata_nv: Fix retrieving of active qcs (git-fixes).\n- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).\n- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).\n- bcache: fix overflow in offset_to_stripe() (git-fixes).\n- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).\n- blk-mq: insert request not through ->queue_rq into sw/scheduler queue (bsc#1182443).\n- blk-mq: move cancel of hctx->run_work to the front of blk_exit_queue (bsc#1182444).\n- block: fix inflight statistics of part0 (bsc#1182445).\n- block: respect queue limit of max discard segment (bsc#1182441).\n- block: virtio_blk: fix handling single range discard request (bsc#1182439).\n- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).\n- Bluetooth: drop HCI device reference before return (git-fixes).\n- Bluetooth: Fix initializing response id after clearing struct (git-fixes).\n- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).\n- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).\n- bnxt_en: Fix accumulation of bp->net_stats_prev (git-fixes).\n- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).\n- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).\n- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).\n- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).\n- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).\n- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).\n- bonding: set dev->needed_headroom in bond_setup_by_slave() (git-fixes).\n- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).\n- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).\n- bpf, cgroup: Fix problematic bounds check (bsc#1155518).\n- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).\n- btrfs: Cleanup try_flush_qgroup (bsc#1182047).\n- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).\n- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).\n- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).\n- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).\n- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).\n- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).\n- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).\n- caif: no need to check return value of debugfs_create functions (git-fixes).\n- ceph: fix flush_snap logic after putting caps (bsc#1182854).\n- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).\n- cgroup: fix psi monitor for root cgroup (bsc#1182686).\n- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).\n- chelsio/chtls: correct function return and return type (git-fixes).\n- chelsio/chtls: correct netdevice for vlan interface (git-fixes).\n- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).\n- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).\n- chelsio/chtls: fix deadlock issue (git-fixes).\n- chelsio/chtls: fix memory leaks caused by a race (git-fixes).\n- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).\n- chelsio/chtls: fix panic during unload reload chtls (git-fixes).\n- chelsio/chtls: fix socket lock (git-fixes).\n- chelsio/chtls: fix tls record info to user (git-fixes).\n- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).\n- chtls: Added a check to avoid NULL pointer dereference (git-fixes).\n- chtls: Fix chtls resources release sequence (git-fixes).\n- chtls: Fix hardware tid leak (git-fixes).\n- chtls: Fix panic when route to peer not configured (git-fixes).\n- chtls: Remove invalid set_tcb call (git-fixes).\n- chtls: Replace skb_dequeue with skb_peek (git-fixes).\n- cifs: check all path components in resolved dfs target (bsc#1181710).\n- cifs: fix nodfs mount option (bsc#1181710).\n- cifs: introduce helper for finding referral server (bsc#1181710).\n- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).\n- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).\n- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).\n- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).\n- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).\n- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).\n- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).\n- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).\n- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).\n- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).\n- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in ->remove() (git-fixes).\n- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).\n- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).\n- crypto: ecdh_helper - Ensure 'len >= secret.len' in decode_key() (git-fixes).\n- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).\n- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).\n- cxgb4: fix all-mask IP address comparison (git-fixes).\n- cxgb4: fix checks for max queues to allocate (git-fixes).\n- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).\n- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).\n- cxgb4: fix SGE queue dump destination buffer context (git-fixes).\n- cxgb4: fix the panic caused by non smac rewrite (git-fixes).\n- cxgb4: move DCB version extern to header file (git-fixes).\n- cxgb4: move handling L2T ARP failures to caller (git-fixes).\n- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).\n- cxgb4: parse TC-U32 key values and masks natively (git-fixes).\n- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).\n- cxgb4: set up filter action after rewrites (git-fixes).\n- cxgb4: use correct type for all-mask IP address comparison (git-fixes).\n- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).\n- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).\n- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).\n- dmaengine: hsu: disable spurious interrupt (git-fixes).\n- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).\n- dm crypt: avoid truncating the logical block size (git-fixes).\n- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).\n- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).\n- dm thin metadata: Avoid returning cmd->bm wild pointer on error (bsc#1177529).\n- dm thin metadata: fix lockdep complaint (bsc#1177529).\n- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).\n- dm: use noio when sending kobject event (bsc#1177529).\n- docs: filesystems: vfs: correct flag name (bsc#1182856).\n- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).\n- drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).\n- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).\n- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).\n- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).\n- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).\n- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).\n- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).\n- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).\n- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).\n- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).\n- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).\n- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).\n- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).\n- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).\n- drm/meson: Unbind all connectors on module removal (bsc#1152472)\n- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)\n- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)\n- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)\n- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)\n- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)\n- Drop HID logitech patch that caused a regression (bsc#1182259) \n- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).\n- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).\n- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).\n- ext4: fix a memory leak of ext4_free_data (bsc#1182447).\n- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).\n- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).\n- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).\n- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).\n- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).\n- firmware_loader: align .builtin_fw to 8 (git-fixes).\n- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).\n- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).\n- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).\n- gma500: clean up error handling in init (git-fixes).\n- gpio: pcf857x: Fix missing first interrupt (git-fixes).\n- HID: core: detect and skip invalid inputs to snto32() (git-fixes).\n- HID: make arrays usage and value to be the same (git-fixes).\n- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).\n- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).\n- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).\n- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).\n- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).\n- i2c: stm32f7: fix configuration of the digital filter (git-fixes).\n- i3c: master: dw: Drop redundant disec call (git-fixes).\n- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).\n- i40e: avoid premature Rx buffer reuse (git-fixes).\n- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).\n- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).\n- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).\n- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).\n- iavf: fix double-release of rtnl_lock (git-fixes).\n- iavf: fix error return code in iavf_init_get_resources() (git-fixes).\n- iavf: fix speed reporting over virtchnl (git-fixes).\n- iavf: Fix updating statistics (git-fixes).\n- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).\n- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).\n- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).\n- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: device remove has higher precedence over reset (bsc#1065729).\n- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).\n- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).\n- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).\n- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).\n- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: serialize access to work queue on remove (bsc#1065729).\n- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).\n- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).\n- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).\n- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).\n- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).\n- igc: fix link speed advertising (git-fixes).\n- igc: Fix returning wrong statistics (git-fixes).\n- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).\n- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).\n- include/linux/memremap.h: remove stale comments (git-fixes).\n- Input: elo - fix an error code in elo_connect() (git-fixes).\n- Input: i8042 - unbreak Pegatron C15B (git-fixes).\n- Input: joydev - prevent potential read overflow in ioctl (git-fixes).\n- Input: sur40 - fix an error code in sur40_probe() (git-fixes).\n- Input: xpad - sync supported devices with fork on GitHub (git-fixes).\n- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).\n- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).\n- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).\n- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).\n- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).\n- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).\n- iwlwifi: pcie: fix context info memory leak (git-fixes).\n- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).\n- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).\n- ixgbe: avoid premature Rx buffer reuse (git-fixes).\n- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).\n- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).\n- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.\n- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: add more data to CSD lock debugging (bsc#1180846).\n- kernel/smp: prepare more CSD lock debugging (bsc#1180846).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).\n- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).\n- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).\n- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).\n- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).\n- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).\n- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).\n- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).\n- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).\n- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).\n- KVM: x86: clear stale x86_emulate_ctxt->intercept value (bsc#1182381).\n- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).\n- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).\n- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).\n- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).\n- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).\n- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).\n- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).\n- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).\n- mac80211: fix fast-rx encryption check (git-fixes).\n- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).\n- mac80211: pause TX while changing interface type (git-fixes).\n- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.\n- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- matroxfb: avoid -Warray-bounds warning (bsc#1152472)\n- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).\n- media: camss: missing error code in msm_video_register() (git-fixes).\n- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).\n- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).\n- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).\n- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).\n- media: lmedm04: Fix misuse of comma (git-fixes).\n- media: media/pci: Fix memleak in empress_init (git-fixes).\n- media: mt9v111: Remove unneeded device-managed puts (git-fixes).\n- media: pwc: Use correct device for DMA (bsc#1181133).\n- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).\n- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).\n- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).\n- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).\n- media: vsp1: Fix an error handling path in the probe function (git-fixes).\n- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).\n- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).\n- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).\n- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).\n- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).\n- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).\n- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).\n- mlxsw: core: Fix memory leak on module removal (git-fixes).\n- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).\n- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).\n- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).\n- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).\n- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).\n- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).\n- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).\n- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).\n- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).\n- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).\n- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).\n- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).\n- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).\n- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).\n- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).\n- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).\n- net: axienet: Fix error return code in axienet_probe() (git-fixes).\n- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).\n- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).\n- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).\n- net: bcmgenet: set Rx mode before starting netif (git-fixes).\n- net: bcmgenet: use hardware padding of runt frames (git-fixes).\n- net: broadcom CNIC: requires MMU (git-fixes).\n- net: caif: Fix debugfs on 64-bit platforms (git-fixes).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).\n- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).\n- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).\n- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).\n- net: ethernet: ave: Fix error returns in ave_init (git-fixes).\n- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).\n- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).\n- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).\n- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).\n- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).\n- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).\n- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).\n- net: gro: do not keep too many GRO packets in napi->rx_list (bsc#1154353).\n- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).\n- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).\n- net: hns3: add reset check for VF updating port based VLAN (git-fixes).\n- net: hns3: clear port base VLAN when unload PF (git-fixes).\n- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).\n- net: hns3: fix a TX timeout issue (git-fixes).\n- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).\n- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).\n- net: hns3: fix for VLAN config when reset failed (git-fixes).\n- net: hns3: fix RSS config lost after VF reset (git-fixes).\n- net: hns3: fix set and get link ksettings issue (git-fixes).\n- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).\n- net: hns3: fix the number of queues actually used by ARQ (git-fixes).\n- net: hns3: fix use-after-free when doing self test (git-fixes).\n- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).\n- net: hns: fix return value check in __lb_other_process() (git-fixes).\n- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).\n- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).\n- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).\n- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix init_hca fields offset (git-fixes).\n- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).\n- net/mlx4_en: Handle TX error CQE (bsc#1181854).\n- net/mlx5: Add handling of port type in rule deletion (git-fixes).\n- net/mlx5: Annotate mutex destroy for root ns (git-fixes).\n- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).\n- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).\n- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).\n- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).\n- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).\n- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).\n- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).\n- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).\n- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).\n- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).\n- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).\n- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).\n- net/mlx5e: Fix error path of device attach (git-fixes).\n- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).\n- net/mlx5e: Fix two double free cases (git-fixes).\n- net/mlx5e: Fix VLAN cleanup flow (git-fixes).\n- net/mlx5e: Fix VLAN create flow (git-fixes).\n- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).\n- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).\n- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).\n- net/mlx5e: Reduce tc unsupported key print level (git-fixes).\n- net/mlx5e: Rename hw_modify to preactivate (git-fixes).\n- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).\n- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).\n- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).\n- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).\n- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).\n- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).\n- net/mlx5: Fix deletion of duplicate rules (git-fixes).\n- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).\n- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).\n- net/mlx5: Fix request_irqs error flow (git-fixes).\n- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).\n- net/mlx5: Query PPS pin operational status before registering it (git-fixes).\n- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).\n- net: moxa: Fix a potential double 'free_irq()' (git-fixes).\n- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).\n- net: mscc: ocelot: fix address ageing time (again) (git-fixes).\n- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).\n- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).\n- net: mvpp2: disable force link UP during port init procedure (git-fixes).\n- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).\n- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).\n- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).\n- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).\n- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).\n- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).\n- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).\n- net: octeon: mgmt: Repair filling of RX ring (git-fixes).\n- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).\n- net: phy: extract link partner advertisement reading (git-fixes).\n- net: phy: extract pause mode (git-fixes).\n- net: phy: marvell10g: fix null pointer dereference (git-fixes).\n- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).\n- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).\n- net: qca_spi: fix receive buffer size check (git-fixes).\n- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).\n- net: qede: fix PTP initialization on recovery (git-fixes).\n- net: qede: fix use-after-free on recovery and AER handling (git-fixes).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix async event callbacks unregistering (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix 'maybe uninitialized' warning (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qed: RDMA personality shouldn't fail VF load (git-fixes).\n- net: re-solve some conflicts after net -> net-next merge (bsc#1176855 ltc#187293).\n- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).\n- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).\n- net: rmnet: fix bridge mode bugs (git-fixes).\n- net: rmnet: fix lower interface leak (git-fixes).\n- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).\n- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).\n- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).\n- net: rmnet: fix suspicious RCU usage (git-fixes).\n- net: rmnet: print error message when command fails (git-fixes).\n- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).\n- net: rmnet: use upper/lower device infrastructure (git-fixes).\n- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).\n- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).\n- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).\n- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).\n- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).\n- net: stmmac: Do not accept invalid MTU values (git-fixes).\n- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).\n- net: stmmac: Enable 16KB buffer size (git-fixes).\n- net: stmmac: fix disabling flexible PPS output (git-fixes).\n- net: stmmac: fix length of PTP clock's name string (git-fixes).\n- net: stmmac: Fix the TX IOC in xmit path (git-fixes).\n- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).\n- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).\n- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).\n- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).\n- net: sun: fix missing release regions in cas_init_one() (git-fixes).\n- net: team: fix memory leak in __team_options_register (git-fixes).\n- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).\n- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).\n- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).\n- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).\n- nvme-multipath: Early exit if no path is available (bsc#1180964).\n- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).\n- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).\n- objtool: Do not fail on missing symbol table (bsc#1169514).\n- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).\n- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).\n- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).\n- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).\n- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).\n- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).\n- perf/x86/intel/uncore: With > 8 nodes, get pci bus die id from NUMA info (bsc#1180989).\n- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).\n- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).\n- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).\n- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).\n- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).\n- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).\n- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).\n- powerpc: Fix alignment bug within the init sections (bsc#1065729).\n- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).\n- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).\n- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).\n- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).\n- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).\n- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).\n- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).\n- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).\n- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).\n- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).\n- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).\n- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).\n- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).\n- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).\n- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).\n- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).\n- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).\n- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).\n- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).\n- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).\n- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).\n- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).\n- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).\n- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).\n- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).\n- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).\n- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).\n- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).\n- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).\n- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).\n- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).\n- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).\n- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).\n- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).\n- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).\n- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).\n- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).\n- qed: select CONFIG_CRC32 (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).\n- quota: Sanity-check quota file headers on load (bsc#1182461).\n- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).\n- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).\n- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)\n- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)\n- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)\n- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).\n- RDMA/efa: Count admin commands errors (bsc#1176248).\n- RDMA/efa: Count mmap failures (bsc#1176248).\n- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).\n- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).\n- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).\n- RDMA/efa: Expose minimum SQ size (bsc#1176248).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).\n- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).\n- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).\n- RDMA/efa: Report create CQ error counter (bsc#1176248).\n- RDMA/efa: Report host information to the device (bsc#1176248).\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).\n- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).\n- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).\n- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).\n- regulator: axp20x: Fix reference cout leak (git-fixes).\n- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).\n- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).\n- regulator: Fix lockdep warning resolving supplies (git-fixes).\n- regulator: s5m8767: Drop regulators OF node reference (git-fixes).\n- regulator: s5m8767: Fix reference count leak (git-fixes).\n- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).\n- reset: hisilicon: correct vendor prefix (git-fixes).\n- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).\n- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).\n- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).\n- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)\n- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)\n- rtc: s5m: select REGMAP_I2C (git-fixes).\n- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).\n- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).\n- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).\n- sched: Reenable interrupts in do_sched_yield() (git-fixes)\n- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).\n- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).\n- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).\n- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).\n- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).\n- smsc95xx: check return value of smsc95xx_reset (git-fixes).\n- soc: aspeed: snoop: Add clock control logic (git-fixes).\n- spi: atmel: Put allocated master before return (git-fixes).\n- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).\n- spi: spi-synquacer: fix set_cs handling (git-fixes).\n- spi: stm32: properly handle 0 byte transfer (git-fixes).\n- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).\n- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).\n- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).\n- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).\n- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).\n- team: set dev->needed_headroom in team_setup_by_port() (git-fixes).\n- tpm: Remove tpm_dev_wq_lock (git-fixes).\n- tpm_tis: Clean up locality release (git-fixes).\n- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).\n- tracing: Check length before giving out the filter buffer (git-fixes).\n- tracing: Do not count ftrace events in top level enable output (git-fixes).\n- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).\n- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).\n- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).\n- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).\n- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).\n- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).\n- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).\n- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455). \n- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).\n- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).\n- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)\n- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).\n- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).\n- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).\n- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).\n- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).\n- USB: gadget: u_audio: Free requests only after callback (git-fixes).\n- USB: mUSB: Fix runtime PM race in musb_queue_resume_work (git-fixes).\n- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).\n- USB: quirks: sort quirk entries (git-fixes).\n- USB: renesas_usbhs: Clear pipe running flag in USBhs_pkt_pop() (git-fixes).\n- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).\n- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).\n- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).\n- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).\n- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).\n- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).\n- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).\n- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).\n- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).\n- virtio_net: Fix error code in probe() (git-fixes).\n- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).\n- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).\n- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).\n- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).\n- vxlan: fix memleak of fdb (git-fixes).\n- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).\n- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).\n- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).\n- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).\n- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).\n- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).\n- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).\n- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).\n- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).\n- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).\n- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).\n- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).\n- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).\n- xfs: ratelimit xfs_discard_page messages (bsc#1182283).\n- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).\n- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).\n- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).\n- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).\n- xhci: fix bounce buffer usage for non-sg list case (git-fixes).\n\nThe kernel-default-base packaging was changed:\n\n- Added squashfs for kiwi installiso support (bsc#1182341)\n- Added fuse (bsc#1182507)\n- Added modules which got lost when migrating away from supported.conf (bsc#1182110):\n * am53c974 had a typo\n * cls_bpf, iscsi_ibft, libahci, libata, openvswitch, sch_ingress\n- Also added vport-* modules for Open vSwitch\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-741,SUSE-SLE-Module-Basesystem-15-SP2-2021-741,SUSE-SLE-Module-Development-Tools-15-SP2-2021-741,SUSE-SLE-Module-Legacy-15-SP2-2021-741,SUSE-SLE-Module-Live-Patching-15-SP2-2021-741,SUSE-SLE-Product-HA-15-SP2-2021-741,SUSE-SLE-Product-WE-15-SP2-2021-741,SUSE-SUSE-MicroOS-5.0-2021-741", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0741-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0741-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210741-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0741-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1078720", url: "https://bugzilla.suse.com/1078720", }, { category: "self", summary: "SUSE Bug 1081134", url: "https://bugzilla.suse.com/1081134", }, { category: "self", summary: "SUSE Bug 1084610", url: "https://bugzilla.suse.com/1084610", }, { category: "self", summary: "SUSE Bug 1132477", url: "https://bugzilla.suse.com/1132477", }, { category: "self", summary: "SUSE Bug 1151927", url: "https://bugzilla.suse.com/1151927", }, { category: "self", summary: "SUSE Bug 1152472", url: "https://bugzilla.suse.com/1152472", }, { category: "self", summary: "SUSE Bug 1152489", url: "https://bugzilla.suse.com/1152489", }, { category: "self", summary: "SUSE Bug 1154353", url: "https://bugzilla.suse.com/1154353", }, { category: "self", summary: "SUSE Bug 1155518", url: "https://bugzilla.suse.com/1155518", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1163776", url: "https://bugzilla.suse.com/1163776", }, { category: "self", summary: "SUSE Bug 1169514", url: "https://bugzilla.suse.com/1169514", }, { category: "self", summary: "SUSE Bug 1170442", url: "https://bugzilla.suse.com/1170442", }, { category: "self", summary: "SUSE Bug 1176248", url: "https://bugzilla.suse.com/1176248", }, { category: "self", summary: "SUSE Bug 1176855", url: "https://bugzilla.suse.com/1176855", }, { category: "self", summary: "SUSE Bug 1177109", url: "https://bugzilla.suse.com/1177109", }, { category: "self", summary: "SUSE Bug 1177326", url: "https://bugzilla.suse.com/1177326", }, { category: "self", summary: "SUSE Bug 1177440", url: "https://bugzilla.suse.com/1177440", }, { category: "self", summary: "SUSE Bug 1177529", url: "https://bugzilla.suse.com/1177529", }, { category: "self", summary: "SUSE Bug 1178142", url: "https://bugzilla.suse.com/1178142", }, { category: "self", summary: "SUSE Bug 1178995", url: "https://bugzilla.suse.com/1178995", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179137", url: "https://bugzilla.suse.com/1179137", }, { category: "self", summary: "SUSE Bug 1179243", url: "https://bugzilla.suse.com/1179243", }, { category: "self", summary: "SUSE Bug 1179428", url: "https://bugzilla.suse.com/1179428", }, { category: "self", summary: "SUSE Bug 1179660", url: "https://bugzilla.suse.com/1179660", }, { category: "self", summary: "SUSE Bug 1179929", url: "https://bugzilla.suse.com/1179929", }, { category: "self", summary: "SUSE Bug 1180058", url: "https://bugzilla.suse.com/1180058", }, { category: "self", summary: "SUSE Bug 1180846", url: "https://bugzilla.suse.com/1180846", }, { category: "self", summary: "SUSE Bug 1180964", url: "https://bugzilla.suse.com/1180964", }, { category: "self", summary: "SUSE Bug 1180989", url: "https://bugzilla.suse.com/1180989", }, { category: "self", summary: "SUSE Bug 1181133", url: "https://bugzilla.suse.com/1181133", }, { category: "self", summary: "SUSE Bug 1181259", url: "https://bugzilla.suse.com/1181259", }, { category: "self", summary: "SUSE Bug 1181544", url: "https://bugzilla.suse.com/1181544", }, { category: "self", summary: "SUSE Bug 1181574", url: "https://bugzilla.suse.com/1181574", }, { category: "self", summary: "SUSE Bug 1181637", url: "https://bugzilla.suse.com/1181637", }, { category: "self", summary: "SUSE Bug 1181655", url: "https://bugzilla.suse.com/1181655", }, { category: "self", summary: "SUSE Bug 1181671", url: "https://bugzilla.suse.com/1181671", }, { category: "self", summary: "SUSE Bug 1181674", url: "https://bugzilla.suse.com/1181674", }, { category: "self", summary: "SUSE Bug 1181710", url: "https://bugzilla.suse.com/1181710", }, { category: "self", summary: "SUSE Bug 1181720", url: "https://bugzilla.suse.com/1181720", }, { category: "self", summary: "SUSE Bug 1181735", url: "https://bugzilla.suse.com/1181735", }, { category: "self", summary: "SUSE Bug 1181736", url: "https://bugzilla.suse.com/1181736", }, { category: "self", summary: "SUSE Bug 1181738", url: "https://bugzilla.suse.com/1181738", }, { category: "self", summary: "SUSE Bug 1181747", url: "https://bugzilla.suse.com/1181747", }, { category: "self", summary: "SUSE Bug 1181753", url: "https://bugzilla.suse.com/1181753", }, { category: "self", summary: "SUSE Bug 1181818", url: "https://bugzilla.suse.com/1181818", }, { category: "self", summary: "SUSE Bug 1181843", url: "https://bugzilla.suse.com/1181843", }, { category: "self", summary: "SUSE Bug 1181854", url: "https://bugzilla.suse.com/1181854", }, { category: "self", summary: "SUSE Bug 1181896", url: "https://bugzilla.suse.com/1181896", }, { category: "self", summary: "SUSE Bug 1181958", url: "https://bugzilla.suse.com/1181958", }, { category: "self", summary: "SUSE Bug 1181960", url: "https://bugzilla.suse.com/1181960", }, { category: "self", summary: "SUSE Bug 1181985", url: "https://bugzilla.suse.com/1181985", }, { category: "self", summary: "SUSE Bug 1182047", url: "https://bugzilla.suse.com/1182047", }, { category: "self", summary: "SUSE Bug 1182110", url: "https://bugzilla.suse.com/1182110", }, { category: "self", summary: "SUSE Bug 1182118", url: "https://bugzilla.suse.com/1182118", }, { category: "self", summary: "SUSE Bug 1182128", url: "https://bugzilla.suse.com/1182128", }, { category: "self", summary: "SUSE Bug 1182140", url: "https://bugzilla.suse.com/1182140", }, { category: "self", summary: "SUSE Bug 1182171", url: "https://bugzilla.suse.com/1182171", }, { category: "self", summary: "SUSE Bug 1182175", url: "https://bugzilla.suse.com/1182175", }, { category: "self", summary: "SUSE Bug 1182259", url: "https://bugzilla.suse.com/1182259", }, { category: "self", summary: "SUSE Bug 1182265", url: "https://bugzilla.suse.com/1182265", }, { category: "self", summary: "SUSE Bug 1182266", url: "https://bugzilla.suse.com/1182266", }, { category: "self", summary: "SUSE Bug 1182267", url: "https://bugzilla.suse.com/1182267", }, { category: "self", summary: "SUSE Bug 1182268", url: "https://bugzilla.suse.com/1182268", }, { category: "self", summary: "SUSE Bug 1182271", url: "https://bugzilla.suse.com/1182271", }, { category: "self", summary: "SUSE Bug 1182272", url: "https://bugzilla.suse.com/1182272", }, { category: "self", summary: "SUSE Bug 1182273", url: "https://bugzilla.suse.com/1182273", }, { category: "self", summary: "SUSE Bug 1182275", url: "https://bugzilla.suse.com/1182275", }, { category: "self", summary: "SUSE Bug 1182276", url: "https://bugzilla.suse.com/1182276", }, { category: "self", summary: "SUSE Bug 1182278", url: "https://bugzilla.suse.com/1182278", }, { category: "self", summary: "SUSE Bug 1182283", url: "https://bugzilla.suse.com/1182283", }, { category: "self", summary: "SUSE Bug 1182341", url: "https://bugzilla.suse.com/1182341", }, { category: "self", summary: "SUSE Bug 1182374", url: "https://bugzilla.suse.com/1182374", }, { category: "self", summary: "SUSE Bug 1182380", url: "https://bugzilla.suse.com/1182380", }, { category: "self", summary: "SUSE Bug 1182381", url: "https://bugzilla.suse.com/1182381", }, { category: "self", summary: "SUSE Bug 1182406", url: "https://bugzilla.suse.com/1182406", }, { category: "self", summary: "SUSE Bug 1182430", url: "https://bugzilla.suse.com/1182430", }, { category: "self", summary: "SUSE Bug 1182439", url: "https://bugzilla.suse.com/1182439", }, { category: "self", summary: "SUSE Bug 1182441", url: "https://bugzilla.suse.com/1182441", }, { category: "self", summary: "SUSE Bug 1182442", url: "https://bugzilla.suse.com/1182442", }, { category: "self", summary: "SUSE Bug 1182443", url: "https://bugzilla.suse.com/1182443", }, { category: "self", summary: "SUSE Bug 1182444", url: "https://bugzilla.suse.com/1182444", }, { category: "self", summary: "SUSE Bug 1182445", url: "https://bugzilla.suse.com/1182445", }, { category: "self", summary: "SUSE Bug 1182446", url: "https://bugzilla.suse.com/1182446", }, { category: "self", summary: "SUSE Bug 1182447", url: "https://bugzilla.suse.com/1182447", }, { category: "self", summary: "SUSE Bug 1182449", url: "https://bugzilla.suse.com/1182449", }, { category: "self", summary: "SUSE Bug 1182454", url: "https://bugzilla.suse.com/1182454", }, { category: "self", summary: "SUSE Bug 1182455", url: "https://bugzilla.suse.com/1182455", }, { category: "self", summary: "SUSE Bug 1182456", url: "https://bugzilla.suse.com/1182456", }, { category: "self", summary: "SUSE Bug 1182457", url: "https://bugzilla.suse.com/1182457", }, { category: "self", summary: "SUSE Bug 1182458", url: "https://bugzilla.suse.com/1182458", }, { category: "self", summary: "SUSE Bug 1182459", url: "https://bugzilla.suse.com/1182459", }, { category: "self", summary: "SUSE Bug 1182460", url: "https://bugzilla.suse.com/1182460", }, { category: "self", summary: "SUSE Bug 1182461", url: "https://bugzilla.suse.com/1182461", }, { category: "self", summary: "SUSE Bug 1182462", url: "https://bugzilla.suse.com/1182462", }, { category: "self", summary: "SUSE Bug 1182463", url: "https://bugzilla.suse.com/1182463", }, { category: "self", summary: "SUSE Bug 1182464", url: "https://bugzilla.suse.com/1182464", }, { category: "self", summary: "SUSE Bug 1182465", url: "https://bugzilla.suse.com/1182465", }, { category: "self", summary: "SUSE Bug 1182466", url: "https://bugzilla.suse.com/1182466", }, { category: "self", summary: "SUSE Bug 1182485", url: "https://bugzilla.suse.com/1182485", }, { category: "self", summary: "SUSE Bug 1182489", url: "https://bugzilla.suse.com/1182489", }, { category: "self", summary: "SUSE Bug 1182490", url: "https://bugzilla.suse.com/1182490", }, { category: "self", summary: "SUSE Bug 1182507", url: "https://bugzilla.suse.com/1182507", }, { category: "self", summary: "SUSE Bug 1182547", url: "https://bugzilla.suse.com/1182547", }, { category: "self", summary: "SUSE Bug 1182558", url: "https://bugzilla.suse.com/1182558", }, { category: "self", summary: "SUSE Bug 1182560", url: "https://bugzilla.suse.com/1182560", }, { category: "self", summary: "SUSE Bug 1182561", url: "https://bugzilla.suse.com/1182561", }, { category: "self", summary: "SUSE Bug 1182571", url: "https://bugzilla.suse.com/1182571", }, { category: "self", summary: "SUSE Bug 1182599", url: "https://bugzilla.suse.com/1182599", }, { category: "self", summary: "SUSE Bug 1182602", url: "https://bugzilla.suse.com/1182602", }, { category: "self", summary: "SUSE Bug 1182626", url: "https://bugzilla.suse.com/1182626", }, { category: "self", summary: "SUSE Bug 1182650", url: "https://bugzilla.suse.com/1182650", }, { category: "self", summary: "SUSE Bug 1182672", url: "https://bugzilla.suse.com/1182672", }, { category: "self", summary: "SUSE Bug 1182676", url: "https://bugzilla.suse.com/1182676", }, { category: "self", summary: "SUSE Bug 1182683", url: "https://bugzilla.suse.com/1182683", }, { category: "self", summary: "SUSE Bug 1182684", url: "https://bugzilla.suse.com/1182684", }, { category: "self", summary: "SUSE Bug 1182686", url: "https://bugzilla.suse.com/1182686", }, { category: "self", summary: "SUSE Bug 1182770", url: "https://bugzilla.suse.com/1182770", }, { category: "self", summary: "SUSE Bug 1182798", url: "https://bugzilla.suse.com/1182798", }, { category: "self", summary: "SUSE Bug 1182800", url: "https://bugzilla.suse.com/1182800", }, { category: "self", summary: "SUSE Bug 1182801", url: "https://bugzilla.suse.com/1182801", }, { category: "self", summary: "SUSE Bug 1182854", url: "https://bugzilla.suse.com/1182854", }, { category: "self", summary: "SUSE Bug 1182856", url: "https://bugzilla.suse.com/1182856", }, { category: "self", summary: "SUSE CVE CVE-2020-12362 page", url: "https://www.suse.com/security/cve/CVE-2020-12362/", }, { category: "self", summary: "SUSE CVE CVE-2020-12363 page", url: "https://www.suse.com/security/cve/CVE-2020-12363/", }, { category: "self", summary: "SUSE CVE CVE-2020-12364 page", url: "https://www.suse.com/security/cve/CVE-2020-12364/", }, { category: "self", summary: "SUSE CVE CVE-2020-12373 page", url: "https://www.suse.com/security/cve/CVE-2020-12373/", }, { category: "self", summary: "SUSE CVE CVE-2020-29368 page", url: "https://www.suse.com/security/cve/CVE-2020-29368/", }, { category: "self", summary: "SUSE CVE CVE-2020-29374 page", url: "https://www.suse.com/security/cve/CVE-2020-29374/", }, { category: "self", summary: "SUSE CVE CVE-2021-26930 page", url: "https://www.suse.com/security/cve/CVE-2021-26930/", }, { category: "self", summary: "SUSE CVE CVE-2021-26931 page", url: "https://www.suse.com/security/cve/CVE-2021-26931/", }, { category: "self", summary: "SUSE CVE CVE-2021-26932 page", url: "https://www.suse.com/security/cve/CVE-2021-26932/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-03-09T15:12:24Z", generator: { date: "2021-03-09T15:12:24Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0741-1", initial_release_date: "2021-03-09T15:12:24Z", revision_history: [ { date: "2021-03-09T15:12:24Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-24.52.1.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-24.52.1.aarch64", product_id: "cluster-md-kmp-default-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-24.52.1.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-24.52.1.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-24.52.1.aarch64", product: { name: "dlm-kmp-default-5.3.18-24.52.1.aarch64", product_id: "dlm-kmp-default-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-24.52.1.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-24.52.1.aarch64", product_id: "dlm-kmp-preempt-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-24.52.1.aarch64", product: { name: "gfs2-kmp-default-5.3.18-24.52.1.aarch64", product_id: "gfs2-kmp-default-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-24.52.1.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-24.52.1.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-24.52.1.aarch64", product: { name: "kernel-default-5.3.18-24.52.1.aarch64", product_id: "kernel-default-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", product: { name: "kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", product_id: "kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-24.52.1.9.24.1.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-24.52.1.9.24.1.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-24.52.1.9.24.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-24.52.1.aarch64", product: { name: "kernel-default-devel-5.3.18-24.52.1.aarch64", product_id: "kernel-default-devel-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-24.52.1.aarch64", product: { name: "kernel-default-extra-5.3.18-24.52.1.aarch64", product_id: "kernel-default-extra-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-24.52.1.aarch64", product: { name: "kernel-default-livepatch-5.3.18-24.52.1.aarch64", product_id: "kernel-default-livepatch-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-24.52.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-24.52.1.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-24.52.1.aarch64", product: { name: "kernel-obs-build-5.3.18-24.52.1.aarch64", product_id: "kernel-obs-build-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-24.52.1.aarch64", product: { name: "kernel-obs-qa-5.3.18-24.52.1.aarch64", product_id: "kernel-obs-qa-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-24.52.1.aarch64", product: { name: "kernel-preempt-5.3.18-24.52.1.aarch64", product_id: "kernel-preempt-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-24.52.1.aarch64", product: { name: "kernel-preempt-devel-5.3.18-24.52.1.aarch64", product_id: "kernel-preempt-devel-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-24.52.1.aarch64", product: { name: "kernel-preempt-extra-5.3.18-24.52.1.aarch64", product_id: "kernel-preempt-extra-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-24.52.1.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-24.52.1.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-24.52.1.aarch64", product: { name: "kernel-syms-5.3.18-24.52.1.aarch64", product_id: "kernel-syms-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-24.52.1.aarch64", product: { name: "kselftests-kmp-default-5.3.18-24.52.1.aarch64", product_id: "kselftests-kmp-default-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-24.52.1.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-24.52.1.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-24.52.1.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-24.52.1.aarch64", product_id: "ocfs2-kmp-default-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-24.52.1.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-24.52.1.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-24.52.1.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-24.52.1.aarch64", product_id: "reiserfs-kmp-default-5.3.18-24.52.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-24.52.1.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-24.52.1.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-24.52.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-24.52.1.noarch", product: { name: "kernel-devel-5.3.18-24.52.1.noarch", product_id: "kernel-devel-5.3.18-24.52.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-24.52.1.noarch", product: { name: "kernel-docs-5.3.18-24.52.1.noarch", product_id: "kernel-docs-5.3.18-24.52.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-24.52.1.noarch", product: { name: "kernel-docs-html-5.3.18-24.52.1.noarch", product_id: "kernel-docs-html-5.3.18-24.52.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-24.52.1.noarch", product: { name: "kernel-macros-5.3.18-24.52.1.noarch", product_id: "kernel-macros-5.3.18-24.52.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-24.52.1.noarch", product: { name: "kernel-source-5.3.18-24.52.1.noarch", product_id: "kernel-source-5.3.18-24.52.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-24.52.1.noarch", product: { name: "kernel-source-vanilla-5.3.18-24.52.1.noarch", product_id: "kernel-source-vanilla-5.3.18-24.52.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-24.52.1.ppc64le", product: { name: "dlm-kmp-default-5.3.18-24.52.1.ppc64le", product_id: "dlm-kmp-default-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-24.52.1.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-24.52.1.ppc64le", product_id: "gfs2-kmp-default-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-24.52.1.ppc64le", product: { name: "kernel-debug-5.3.18-24.52.1.ppc64le", product_id: "kernel-debug-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-24.52.1.ppc64le", product: { name: "kernel-debug-devel-5.3.18-24.52.1.ppc64le", product_id: "kernel-debug-devel-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-24.52.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-24.52.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-24.52.1.ppc64le", product: { name: "kernel-default-5.3.18-24.52.1.ppc64le", product_id: "kernel-default-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", product: { name: "kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", product_id: "kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-24.52.1.9.24.1.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-24.52.1.9.24.1.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-24.52.1.9.24.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-24.52.1.ppc64le", product: { name: "kernel-default-devel-5.3.18-24.52.1.ppc64le", product_id: "kernel-default-devel-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-24.52.1.ppc64le", product: { name: "kernel-default-extra-5.3.18-24.52.1.ppc64le", product_id: "kernel-default-extra-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-24.52.1.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-24.52.1.ppc64le", product_id: "kernel-default-livepatch-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-24.52.1.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-24.52.1.ppc64le", product_id: "kernel-kvmsmall-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-24.52.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-24.52.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-24.52.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-24.52.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", product: { name: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", product_id: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-24.52.1.ppc64le", product: { name: "kernel-obs-build-5.3.18-24.52.1.ppc64le", product_id: "kernel-obs-build-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-24.52.1.ppc64le", product: { name: "kernel-obs-qa-5.3.18-24.52.1.ppc64le", product_id: "kernel-obs-qa-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-24.52.1.ppc64le", product: { name: "kernel-syms-5.3.18-24.52.1.ppc64le", product_id: "kernel-syms-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-24.52.1.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-24.52.1.ppc64le", product_id: "kselftests-kmp-default-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-24.52.1.s390x", product: { name: "cluster-md-kmp-default-5.3.18-24.52.1.s390x", product_id: "cluster-md-kmp-default-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-24.52.1.s390x", product: { name: "dlm-kmp-default-5.3.18-24.52.1.s390x", product_id: "dlm-kmp-default-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-24.52.1.s390x", product: { name: "gfs2-kmp-default-5.3.18-24.52.1.s390x", product_id: "gfs2-kmp-default-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-24.52.1.s390x", product: { name: "kernel-default-5.3.18-24.52.1.s390x", product_id: "kernel-default-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", product: { name: "kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", product_id: "kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-24.52.1.9.24.1.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-24.52.1.9.24.1.s390x", product_id: "kernel-default-base-rebuild-5.3.18-24.52.1.9.24.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-24.52.1.s390x", product: { name: "kernel-default-devel-5.3.18-24.52.1.s390x", product_id: "kernel-default-devel-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-24.52.1.s390x", product: { name: "kernel-default-extra-5.3.18-24.52.1.s390x", product_id: "kernel-default-extra-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-24.52.1.s390x", product: { name: "kernel-default-livepatch-5.3.18-24.52.1.s390x", product_id: "kernel-default-livepatch-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", product: { name: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", product_id: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-24.52.1.s390x", product: { name: "kernel-obs-build-5.3.18-24.52.1.s390x", product_id: "kernel-obs-build-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-24.52.1.s390x", product: { name: "kernel-obs-qa-5.3.18-24.52.1.s390x", product_id: "kernel-obs-qa-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-24.52.1.s390x", product: { name: "kernel-syms-5.3.18-24.52.1.s390x", product_id: "kernel-syms-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-24.52.1.s390x", product: { name: "kernel-zfcpdump-5.3.18-24.52.1.s390x", product_id: "kernel-zfcpdump-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-24.52.1.s390x", product: { name: "kselftests-kmp-default-5.3.18-24.52.1.s390x", product_id: "kselftests-kmp-default-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-24.52.1.s390x", product: { name: "ocfs2-kmp-default-5.3.18-24.52.1.s390x", product_id: "ocfs2-kmp-default-5.3.18-24.52.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-24.52.1.s390x", product: { name: "reiserfs-kmp-default-5.3.18-24.52.1.s390x", product_id: "reiserfs-kmp-default-5.3.18-24.52.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-24.52.1.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-24.52.1.x86_64", product_id: "cluster-md-kmp-default-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-24.52.1.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-24.52.1.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-24.52.1.x86_64", product: { name: "dlm-kmp-default-5.3.18-24.52.1.x86_64", product_id: "dlm-kmp-default-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-24.52.1.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-24.52.1.x86_64", product_id: "dlm-kmp-preempt-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-24.52.1.x86_64", product: { name: "gfs2-kmp-default-5.3.18-24.52.1.x86_64", product_id: "gfs2-kmp-default-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-24.52.1.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-24.52.1.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-24.52.1.x86_64", product: { name: "kernel-debug-5.3.18-24.52.1.x86_64", product_id: "kernel-debug-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-24.52.1.x86_64", product: { name: "kernel-debug-devel-5.3.18-24.52.1.x86_64", product_id: "kernel-debug-devel-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-24.52.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-24.52.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-24.52.1.x86_64", product: { name: "kernel-default-5.3.18-24.52.1.x86_64", product_id: "kernel-default-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", product: { name: "kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", product_id: "kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-24.52.1.9.24.1.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-24.52.1.9.24.1.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-24.52.1.9.24.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-24.52.1.x86_64", product: { name: "kernel-default-devel-5.3.18-24.52.1.x86_64", product_id: "kernel-default-devel-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-24.52.1.x86_64", product: { name: "kernel-default-extra-5.3.18-24.52.1.x86_64", product_id: "kernel-default-extra-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-24.52.1.x86_64", product: { name: "kernel-default-livepatch-5.3.18-24.52.1.x86_64", product_id: "kernel-default-livepatch-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-24.52.1.x86_64", product: { name: "kernel-kvmsmall-5.3.18-24.52.1.x86_64", product_id: "kernel-kvmsmall-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-24.52.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-24.52.1.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-24.52.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-24.52.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-24_52-preempt-1-5.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-24_52-preempt-1-5.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-24_52-preempt-1-5.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-24.52.1.x86_64", product: { name: "kernel-obs-build-5.3.18-24.52.1.x86_64", product_id: "kernel-obs-build-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-24.52.1.x86_64", product: { name: "kernel-obs-qa-5.3.18-24.52.1.x86_64", product_id: "kernel-obs-qa-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-24.52.1.x86_64", product: { name: "kernel-preempt-5.3.18-24.52.1.x86_64", product_id: "kernel-preempt-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-24.52.1.x86_64", product: { name: "kernel-preempt-devel-5.3.18-24.52.1.x86_64", product_id: "kernel-preempt-devel-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-24.52.1.x86_64", product: { name: "kernel-preempt-extra-5.3.18-24.52.1.x86_64", product_id: "kernel-preempt-extra-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-24.52.1.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-24.52.1.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-24.52.1.x86_64", product: { name: "kernel-syms-5.3.18-24.52.1.x86_64", product_id: "kernel-syms-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-24.52.1.x86_64", product: { name: "kselftests-kmp-default-5.3.18-24.52.1.x86_64", product_id: "kselftests-kmp-default-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-24.52.1.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-24.52.1.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-24.52.1.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-24.52.1.x86_64", product_id: "ocfs2-kmp-default-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-24.52.1.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-24.52.1.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-24.52.1.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-24.52.1.x86_64", product_id: "reiserfs-kmp-default-5.3.18-24.52.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-24.52.1.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-24.52.1.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-24.52.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP2", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP2", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP2", product: { name: "SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP2", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP2", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP2", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.0", product: { name: "SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.0", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.52.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", }, product_reference: "kernel-default-5.3.18-24.52.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.52.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", }, product_reference: "kernel-default-5.3.18-24.52.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.52.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", }, product_reference: "kernel-default-5.3.18-24.52.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.52.1.9.24.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", }, product_reference: "kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.52.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-24.52.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.52.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-24.52.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.52.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-24.52.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-24.52.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", }, product_reference: "kernel-devel-5.3.18-24.52.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-24.52.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", }, product_reference: "kernel-macros-5.3.18-24.52.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.52.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-24.52.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-24.52.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", }, product_reference: "kernel-docs-5.3.18-24.52.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.52.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-24.52.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.52.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-24.52.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.52.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-24.52.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.52.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-24.52.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-24.52.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", }, product_reference: "kernel-source-5.3.18-24.52.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.52.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", }, product_reference: "kernel-syms-5.3.18-24.52.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.52.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-24.52.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.52.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", }, product_reference: "kernel-syms-5.3.18-24.52.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", }, product_reference: "kernel-syms-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.52.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-24.52.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.52.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.52.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-24.52.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-24.52.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-24.52.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-24.52.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-24.52.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-24.52.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", }, product_reference: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", }, product_reference: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", }, product_reference: "kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-24.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-24.52.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-24.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-24.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-24.52.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-24.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-24.52.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-24.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-24.52.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-24.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", }, product_reference: "dlm-kmp-default-5.3.18-24.52.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-24.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-24.52.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-24.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-24.52.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-24.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-24.52.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-24.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-24.52.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-24.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-24.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-24.52.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", }, product_reference: "kernel-default-extra-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-extra-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", }, product_reference: "kernel-preempt-extra-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.52.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", }, product_reference: "kernel-default-5.3.18-24.52.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.52.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.52.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.0", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.0", }, ], }, vulnerabilities: [ { cve: "CVE-2020-12362", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12362", }, ], notes: [ { category: "general", text: "Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12362", url: "https://www.suse.com/security/cve/CVE-2020-12362", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12362", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1182033 for CVE-2020-12362", url: "https://bugzilla.suse.com/1182033", }, { category: "external", summary: "SUSE Bug 1190859 for CVE-2020-12362", url: "https://bugzilla.suse.com/1190859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:12:24Z", details: "important", }, ], title: "CVE-2020-12362", }, { cve: "CVE-2020-12363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12363", }, ], notes: [ { category: "general", text: "Improper input validation in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12363", url: "https://www.suse.com/security/cve/CVE-2020-12363", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12363", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1181735 for CVE-2020-12363", url: "https://bugzilla.suse.com/1181735", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:12:24Z", details: "low", }, ], title: "CVE-2020-12363", }, { cve: "CVE-2020-12364", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12364", }, ], notes: [ { category: "general", text: "Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12364", url: "https://www.suse.com/security/cve/CVE-2020-12364", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12364", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1181736 for CVE-2020-12364", url: "https://bugzilla.suse.com/1181736", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:12:24Z", details: "low", }, ], title: "CVE-2020-12364", }, { cve: "CVE-2020-12373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12373", }, ], notes: [ { category: "general", text: "Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12373", url: "https://www.suse.com/security/cve/CVE-2020-12373", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12373", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1181738 for CVE-2020-12373", url: "https://bugzilla.suse.com/1181738", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:12:24Z", details: "low", }, ], title: "CVE-2020-12373", }, { cve: "CVE-2020-29368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29368", }, ], notes: [ { category: "general", text: "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29368", url: "https://www.suse.com/security/cve/CVE-2020-29368", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179660", }, { category: "external", summary: "SUSE Bug 1179664 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:12:24Z", details: "moderate", }, ], title: "CVE-2020-29368", }, { cve: "CVE-2020-29374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29374", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29374", url: "https://www.suse.com/security/cve/CVE-2020-29374", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:12:24Z", details: "low", }, ], title: "CVE-2020-29374", }, { cve: "CVE-2021-26930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26930", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26930", url: "https://www.suse.com/security/cve/CVE-2021-26930", }, { category: "external", summary: "SUSE Bug 1181843 for CVE-2021-26930", url: "https://bugzilla.suse.com/1181843", }, { category: "external", summary: "SUSE Bug 1182294 for CVE-2021-26930", url: "https://bugzilla.suse.com/1182294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:12:24Z", details: "important", }, ], title: "CVE-2021-26930", }, { cve: "CVE-2021-26931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26931", url: "https://www.suse.com/security/cve/CVE-2021-26931", }, { category: "external", summary: "SUSE Bug 1181753 for CVE-2021-26931", url: "https://bugzilla.suse.com/1181753", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-26931", url: "https://bugzilla.suse.com/1183022", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:12:24Z", details: "moderate", }, ], title: "CVE-2021-26931", }, { cve: "CVE-2021-26932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26932", url: "https://www.suse.com/security/cve/CVE-2021-26932", }, { category: "external", summary: "SUSE Bug 1181747 for CVE-2021-26932", url: "https://bugzilla.suse.com/1181747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.52.1.9.24.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.52.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.52.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.52.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:12:24Z", details: "moderate", }, ], title: "CVE-2021-26932", }, ], }
suse-su-2021:0736-1
Vulnerability from csaf_suse
Published
2021-03-09 15:06
Modified
2021-03-09 15:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access
because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).
The following non-security bugs were fixed:
- cifs: check all path components in resolved dfs target (bsc#1180906).
- cifs: fix check of tcon dfs in smb1 (bsc#1180906).
- cifs: fix nodfs mount option (bsc#1180906).
- cifs: introduce helper for finding referral server (bsc#1180906).
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014)
- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886)
- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead.
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)
- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).
- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one). There is: ExportFilter: ^kernel-obs-build.*\.x86_64.rpm$ . i586 in Factory's prjconf now. No other actively maintained distro (i.e. merging packaging branch) builds a x86_32 kernel, hence pushing to packaging directly.
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: fc: add FPIN ELS definition (bsc#1181441).
- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1181441)
- scsi: fc: Update Descriptor definition and add RDF and Link Integrity FPINs (bsc#1181441).
- scsi: Fix trivial spelling (bsc#1181441).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1181441).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1181441).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1181441).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1181441).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1181441).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1181441).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1181441).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1181441).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1181441).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1181441).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1181441).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1181441).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1181441).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1181441).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1181441).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1181441).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1181441).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1181441).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1181441).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1181441).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1181441).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1181441).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1181441).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1181441).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1181441).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1181441).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1181441).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1181441).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1181441).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1181441).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1181441).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1181441).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1181441).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1181441).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1181441).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1181441).
- scsi: qla2xxx: Fix login timeout (bsc#1181441).
- scsi: qla2xxx: Fix memory size truncation (bsc#1181441).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1181441).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1181441).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1181441).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1181441).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1181441).
- scsi: qla2xxx: Fix regression on sparc64 (bsc#1181441).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1181441).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1181441).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1181441).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1181441).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1181441).
- scsi: qla2xxx: Fix the return value (bsc#1181441).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1181441).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1181441).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1181441).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1181441).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1181441).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1181441).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1181441).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1181441).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1181441).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1181441).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1181441).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1181441).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1181441).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1181441).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1181441).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1181441).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1181441).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1181441).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1181441).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1181441).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1181441).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1181441).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1181441).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1181441).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1181441).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1181441).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1181441).
- scsi: qla2xxx: Performance tweak (bsc#1181441).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1181441).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1181441).
- scsi: qla2xxx: Remove an unused function (bsc#1181441).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1181441).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1181441).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1181441).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1181441).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1181441).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1181441).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1181441).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1181441).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1181441).
- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1181441).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1181441).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1181441).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1181441).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1181441).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1181441).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1181441).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1181441).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1181441).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1181441).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1181441).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1181441).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1181441).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1181441).
- scsi: qla2xxx: Use constant when it is known (bsc#1181441).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1181441).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1181441).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1181441).
- scsi: qla2xxx: Use true, false for ha->fw_dumped (bsc#1181441).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1181441).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1181441).
- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1181441).
- scsi: scsi_transport_fc: refactor event posting routines (bsc#1181441).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1181441).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
Patchnames
SUSE-2021-736,SUSE-OpenStack-Cloud-9-2021-736,SUSE-OpenStack-Cloud-Crowbar-9-2021-736,SUSE-SLE-HA-12-SP4-2021-736,SUSE-SLE-Live-Patching-12-SP4-2021-736,SUSE-SLE-SAP-12-SP4-2021-736,SUSE-SLE-SERVER-12-SP4-LTSS-2021-736
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).\n- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).\n- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).\n by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).\n- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access\n because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).\n\nThe following non-security bugs were fixed:\n\n- cifs: check all path components in resolved dfs target (bsc#1180906).\n- cifs: fix check of tcon dfs in smb1 (bsc#1180906).\n- cifs: fix nodfs mount option (bsc#1180906).\n- cifs: introduce helper for finding referral server (bsc#1180906).\n- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)\n- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')\n- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install\n- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014) \n- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.\n- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) \n- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead.\n- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)\n- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)\n- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).\n- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one). There is: ExportFilter: ^kernel-obs-build.*\\.x86_64.rpm$ . i586 in Factory's prjconf now. No other actively maintained distro (i.e. merging packaging branch) builds a x86_32 kernel, hence pushing to packaging directly.\n- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)\n- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section\n- scsi: fc: add FPIN ELS definition (bsc#1181441).\n- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1181441)\n- scsi: fc: Update Descriptor definition and add RDF and Link Integrity FPINs (bsc#1181441).\n- scsi: Fix trivial spelling (bsc#1181441).\n- scsi: qla2xxx: Add IOCB resource tracking (bsc#1181441).\n- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1181441).\n- scsi: qla2xxx: Address a set of sparse warnings (bsc#1181441).\n- scsi: qla2xxx: Add rport fields in debugfs (bsc#1181441).\n- scsi: qla2xxx: Add SLER and PI control support (bsc#1181441).\n- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1181441).\n- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1181441).\n- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1181441).\n- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1181441).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1181441).\n- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1181441).\n- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1181441).\n- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1181441).\n- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1181441).\n- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1181441).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1181441).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1181441).\n- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1181441).\n- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1181441).\n- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1181441).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1181441).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1181441).\n- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1181441).\n- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1181441).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1181441).\n- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1181441).\n- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1181441). \n- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1181441).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1181441).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1181441).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1181441).\n- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1181441).\n- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1181441).\n- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1181441).\n- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1181441).\n- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1181441).\n- scsi: qla2xxx: Fix login timeout (bsc#1181441).\n- scsi: qla2xxx: Fix memory size truncation (bsc#1181441).\n- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1181441).\n- scsi: qla2xxx: Fix MPI reset needed message (bsc#1181441).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1181441).\n- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1181441).\n- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1181441).\n- scsi: qla2xxx: Fix regression on sparc64 (bsc#1181441).\n- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1181441).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1181441).\n- scsi: qla2xxx: Fix spelling of a variable name (bsc#1181441).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1181441).\n- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1181441).\n- scsi: qla2xxx: Fix the return value (bsc#1181441).\n- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1181441).\n- scsi: qla2xxx: Fix warning after FC target reset (bsc#1181441).\n- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1181441).\n- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1181441).\n- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1181441).\n- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1181441).\n- scsi: qla2xxx: Flush I/O on zone disable (bsc#1181441).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1181441).\n- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1181441).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1181441).\n- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1181441).\n- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1181441).\n- scsi: qla2xxx: Initialize 'n' before using it (bsc#1181441).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1181441).\n- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1181441).\n- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1181441).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1181441). \n- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1181441).\n- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1181441).\n- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1181441).\n- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1181441).\n- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1181441).\n- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1181441).\n- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1181441).\n- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1181441).\n- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1181441).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1181441).\n- scsi: qla2xxx: Performance tweak (bsc#1181441).\n- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1181441).\n- scsi: qla2xxx: Reduce noisy debug message (bsc#1181441).\n- scsi: qla2xxx: Remove an unused function (bsc#1181441).\n- scsi: qla2xxx: Remove a superfluous cast (bsc#1181441).\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1181441).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1181441).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1181441).\n- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1181441).\n- scsi: qla2xxx: Remove redundant variable initialization (bsc#1181441).\n- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1181441).\n- scsi: qla2xxx: Remove superfluous memset() (bsc#1181441).\n- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1181441).\n- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1181441).\n- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1181441).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1181441).\n- scsi: qla2xxx: SAN congestion management implementation (bsc#1181441).\n- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1181441).\n- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1181441).\n- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1181441).\n- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1181441).\n- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1181441).\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1181441).\n- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1181441).\n- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1181441).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1181441).\n- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1181441).\n- scsi: qla2xxx: Use constant when it is known (bsc#1181441).\n- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1181441).\n- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1181441).\n- scsi: qla2xxx: Use register names instead of register offsets (bsc#1181441).\n- scsi: qla2xxx: Use true, false for ha->fw_dumped (bsc#1181441).\n- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1181441).\n- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1181441).\n- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1181441).\n- scsi: scsi_transport_fc: refactor event posting routines (bsc#1181441).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1181441).\n- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-736,SUSE-OpenStack-Cloud-9-2021-736,SUSE-OpenStack-Cloud-Crowbar-9-2021-736,SUSE-SLE-HA-12-SP4-2021-736,SUSE-SLE-Live-Patching-12-SP4-2021-736,SUSE-SLE-SAP-12-SP4-2021-736,SUSE-SLE-SERVER-12-SP4-LTSS-2021-736", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0736-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0736-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210736-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0736-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1163592", url: "https://bugzilla.suse.com/1163592", }, { category: "self", summary: "SUSE Bug 1176831", url: "https://bugzilla.suse.com/1176831", }, { category: "self", summary: "SUSE Bug 1178401", url: "https://bugzilla.suse.com/1178401", }, { category: "self", summary: "SUSE Bug 1178762", url: "https://bugzilla.suse.com/1178762", }, { category: "self", summary: "SUSE Bug 1179014", url: "https://bugzilla.suse.com/1179014", }, { category: "self", summary: "SUSE Bug 1179015", url: "https://bugzilla.suse.com/1179015", }, { category: "self", summary: "SUSE Bug 1179045", url: "https://bugzilla.suse.com/1179045", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179428", url: "https://bugzilla.suse.com/1179428", }, { category: "self", summary: "SUSE Bug 1179660", url: "https://bugzilla.suse.com/1179660", }, { category: "self", summary: "SUSE Bug 1180058", url: "https://bugzilla.suse.com/1180058", }, { category: "self", summary: "SUSE Bug 1180906", url: "https://bugzilla.suse.com/1180906", }, { category: "self", summary: "SUSE Bug 1181441", url: "https://bugzilla.suse.com/1181441", }, { category: "self", summary: "SUSE Bug 1181747", url: "https://bugzilla.suse.com/1181747", }, { category: "self", summary: "SUSE Bug 1181753", url: "https://bugzilla.suse.com/1181753", }, { category: "self", summary: "SUSE Bug 1181843", url: "https://bugzilla.suse.com/1181843", }, { category: "self", summary: "SUSE Bug 1182140", url: "https://bugzilla.suse.com/1182140", }, { category: "self", summary: "SUSE Bug 1182175", url: "https://bugzilla.suse.com/1182175", }, { category: "self", summary: "SUSE CVE CVE-2020-29368 page", url: "https://www.suse.com/security/cve/CVE-2020-29368/", }, { category: "self", summary: "SUSE CVE CVE-2020-29374 page", url: "https://www.suse.com/security/cve/CVE-2020-29374/", }, { category: "self", summary: "SUSE CVE CVE-2021-26930 page", url: "https://www.suse.com/security/cve/CVE-2021-26930/", }, { category: "self", summary: "SUSE CVE CVE-2021-26931 page", url: "https://www.suse.com/security/cve/CVE-2021-26931/", }, { category: "self", summary: "SUSE CVE CVE-2021-26932 page", url: "https://www.suse.com/security/cve/CVE-2021-26932/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-03-09T15:06:25Z", generator: { date: "2021-03-09T15:06:25Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0736-1", initial_release_date: "2021-03-09T15:06:25Z", revision_history: [ { date: "2021-03-09T15:06:25Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.71.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-95.71.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.71.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-95.71.1.aarch64", product_id: "dlm-kmp-default-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.71.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-95.71.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.71.1.aarch64", product: { name: "kernel-default-4.12.14-95.71.1.aarch64", product_id: "kernel-default-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.71.1.aarch64", product: { name: "kernel-default-base-4.12.14-95.71.1.aarch64", product_id: "kernel-default-base-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.71.1.aarch64", product: { name: "kernel-default-devel-4.12.14-95.71.1.aarch64", product_id: "kernel-default-devel-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.71.1.aarch64", product: { name: "kernel-default-extra-4.12.14-95.71.1.aarch64", product_id: "kernel-default-extra-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-95.71.1.aarch64", product: { name: "kernel-default-kgraft-4.12.14-95.71.1.aarch64", product_id: "kernel-default-kgraft-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-95.71.1.aarch64", product: { name: "kernel-default-kgraft-devel-4.12.14-95.71.1.aarch64", product_id: "kernel-default-kgraft-devel-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.71.1.aarch64", product: { name: "kernel-obs-build-4.12.14-95.71.1.aarch64", product_id: "kernel-obs-build-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-95.71.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-95.71.1.aarch64", product_id: "kernel-obs-qa-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.71.1.aarch64", product: { name: "kernel-syms-4.12.14-95.71.1.aarch64", product_id: "kernel-syms-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-95.71.1.aarch64", product: { name: "kernel-vanilla-4.12.14-95.71.1.aarch64", product_id: "kernel-vanilla-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-95.71.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-95.71.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-95.71.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-95.71.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-95.71.1.aarch64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-95.71.1.aarch64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-95.71.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-95.71.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-95.71.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.71.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-95.71.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-95.71.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-95.71.1.noarch", product: { name: "kernel-devel-4.12.14-95.71.1.noarch", product_id: "kernel-devel-4.12.14-95.71.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-95.71.1.noarch", product: { name: "kernel-docs-4.12.14-95.71.1.noarch", product_id: "kernel-docs-4.12.14-95.71.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-95.71.1.noarch", product: { name: "kernel-docs-html-4.12.14-95.71.1.noarch", product_id: "kernel-docs-html-4.12.14-95.71.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-95.71.1.noarch", product: { name: "kernel-macros-4.12.14-95.71.1.noarch", product_id: "kernel-macros-4.12.14-95.71.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-95.71.1.noarch", product: { name: "kernel-source-4.12.14-95.71.1.noarch", product_id: "kernel-source-4.12.14-95.71.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-95.71.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-95.71.1.noarch", product_id: "kernel-source-vanilla-4.12.14-95.71.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.71.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-95.71.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.71.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-95.71.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-95.71.1.ppc64le", product: { name: "kernel-debug-4.12.14-95.71.1.ppc64le", product_id: "kernel-debug-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-95.71.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-95.71.1.ppc64le", product_id: "kernel-debug-base-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-95.71.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-95.71.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-95.71.1.ppc64le", product: { name: "kernel-debug-kgraft-devel-4.12.14-95.71.1.ppc64le", product_id: "kernel-debug-kgraft-devel-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.71.1.ppc64le", product: { name: "kernel-default-4.12.14-95.71.1.ppc64le", product_id: "kernel-default-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.71.1.ppc64le", product: { name: "kernel-default-base-4.12.14-95.71.1.ppc64le", product_id: "kernel-default-base-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.71.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-95.71.1.ppc64le", product_id: "kernel-default-devel-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.71.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-95.71.1.ppc64le", product_id: "kernel-default-extra-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-95.71.1.ppc64le", product: { name: "kernel-default-kgraft-4.12.14-95.71.1.ppc64le", product_id: "kernel-default-kgraft-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", product: { name: "kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", product_id: "kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.71.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-95.71.1.ppc64le", product_id: "kernel-obs-build-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-95.71.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-95.71.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.71.1.ppc64le", product: { name: "kernel-syms-4.12.14-95.71.1.ppc64le", product_id: "kernel-syms-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-95.71.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-95.71.1.ppc64le", product_id: "kernel-vanilla-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-95.71.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-95.71.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-95.71.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-95.71.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-95.71.1.ppc64le", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-95.71.1.ppc64le", product_id: "kernel-vanilla-kgraft-devel-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", product: { name: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", product_id: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-95.71.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-95.71.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-95.71.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.71.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-95.71.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.71.1.s390x", product: { name: "dlm-kmp-default-4.12.14-95.71.1.s390x", product_id: "dlm-kmp-default-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.71.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-95.71.1.s390x", product_id: "gfs2-kmp-default-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.71.1.s390x", product: { name: "kernel-default-4.12.14-95.71.1.s390x", product_id: "kernel-default-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.71.1.s390x", product: { name: "kernel-default-base-4.12.14-95.71.1.s390x", product_id: "kernel-default-base-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.71.1.s390x", product: { name: "kernel-default-devel-4.12.14-95.71.1.s390x", product_id: "kernel-default-devel-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.71.1.s390x", product: { name: "kernel-default-extra-4.12.14-95.71.1.s390x", product_id: "kernel-default-extra-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-95.71.1.s390x", product: { name: "kernel-default-kgraft-4.12.14-95.71.1.s390x", product_id: "kernel-default-kgraft-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", product: { name: "kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", product_id: "kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-95.71.1.s390x", product: { name: "kernel-default-man-4.12.14-95.71.1.s390x", product_id: "kernel-default-man-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.71.1.s390x", product: { name: "kernel-obs-build-4.12.14-95.71.1.s390x", product_id: "kernel-obs-build-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-95.71.1.s390x", product: { name: "kernel-obs-qa-4.12.14-95.71.1.s390x", product_id: "kernel-obs-qa-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.71.1.s390x", product: { name: "kernel-syms-4.12.14-95.71.1.s390x", product_id: "kernel-syms-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-95.71.1.s390x", product: { name: "kernel-vanilla-4.12.14-95.71.1.s390x", product_id: "kernel-vanilla-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-95.71.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-95.71.1.s390x", product_id: "kernel-vanilla-base-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-95.71.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-95.71.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-95.71.1.s390x", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-95.71.1.s390x", product_id: "kernel-vanilla-kgraft-devel-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-95.71.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-95.71.1.s390x", product_id: "kernel-zfcpdump-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-95.71.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-95.71.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", product: { name: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", product_id: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-95.71.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-95.71.1.s390x", product_id: "kselftests-kmp-default-4.12.14-95.71.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.71.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-95.71.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-95.71.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.71.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-95.71.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.71.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-95.71.1.x86_64", product_id: "dlm-kmp-default-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.71.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-95.71.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-95.71.1.x86_64", product: { name: "kernel-debug-4.12.14-95.71.1.x86_64", product_id: "kernel-debug-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-95.71.1.x86_64", product: { name: "kernel-debug-base-4.12.14-95.71.1.x86_64", product_id: "kernel-debug-base-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-95.71.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-95.71.1.x86_64", product_id: "kernel-debug-devel-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-95.71.1.x86_64", product: { name: "kernel-debug-kgraft-devel-4.12.14-95.71.1.x86_64", product_id: "kernel-debug-kgraft-devel-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.71.1.x86_64", product: { name: "kernel-default-4.12.14-95.71.1.x86_64", product_id: "kernel-default-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.71.1.x86_64", product: { name: "kernel-default-base-4.12.14-95.71.1.x86_64", product_id: "kernel-default-base-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.71.1.x86_64", product: { name: "kernel-default-devel-4.12.14-95.71.1.x86_64", product_id: "kernel-default-devel-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.71.1.x86_64", product: { name: "kernel-default-extra-4.12.14-95.71.1.x86_64", product_id: "kernel-default-extra-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-95.71.1.x86_64", product: { name: "kernel-default-kgraft-4.12.14-95.71.1.x86_64", product_id: "kernel-default-kgraft-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", product: { name: "kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", product_id: "kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-95.71.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-95.71.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-95.71.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-95.71.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-95.71.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-95.71.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-kgraft-devel-4.12.14-95.71.1.x86_64", product: { name: "kernel-kvmsmall-kgraft-devel-4.12.14-95.71.1.x86_64", product_id: "kernel-kvmsmall-kgraft-devel-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.71.1.x86_64", product: { name: "kernel-obs-build-4.12.14-95.71.1.x86_64", product_id: "kernel-obs-build-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-95.71.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-95.71.1.x86_64", product_id: "kernel-obs-qa-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.71.1.x86_64", product: { name: "kernel-syms-4.12.14-95.71.1.x86_64", product_id: "kernel-syms-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-95.71.1.x86_64", product: { name: "kernel-vanilla-4.12.14-95.71.1.x86_64", product_id: "kernel-vanilla-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-95.71.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-95.71.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-95.71.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-95.71.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-95.71.1.x86_64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-95.71.1.x86_64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", product: { name: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", product_id: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-95.71.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-95.71.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-95.71.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.71.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-95.71.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-95.71.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP4", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP4", product: { name: "SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.71.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.71.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.71.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.71.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.71.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.71.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.71.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.71.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", }, product_reference: "kernel-source-4.12.14-95.71.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.71.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.71.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.71.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.71.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.71.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.71.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.71.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.71.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.71.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", }, product_reference: "kernel-source-4.12.14-95.71.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.71.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-95.71.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-95.71.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-95.71.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-95.71.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-95.71.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-95.71.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-95.71.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-95.71.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", }, product_reference: "kernel-default-kgraft-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-95.71.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", }, product_reference: "kernel-default-kgraft-4.12.14-95.71.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-kgraft-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", }, product_reference: "kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-95.71.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", }, product_reference: "kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", }, product_reference: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", }, product_reference: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", }, product_reference: "kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", }, product_reference: "kernel-default-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.71.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.71.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", }, product_reference: "kernel-source-4.12.14-95.71.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.71.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", }, product_reference: "kernel-default-4.12.14-95.71.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", }, product_reference: "kernel-default-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", }, product_reference: "kernel-default-4.12.14-95.71.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.71.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-95.71.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", }, product_reference: "kernel-default-base-4.12.14-95.71.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.71.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-95.71.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-95.71.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-95.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", }, product_reference: "kernel-default-man-4.12.14-95.71.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.71.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.71.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.71.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.71.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.71.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", }, product_reference: "kernel-source-4.12.14-95.71.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.71.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", }, product_reference: "kernel-syms-4.12.14-95.71.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.71.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-95.71.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", }, product_reference: "kernel-syms-4.12.14-95.71.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.71.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.71.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2020-29368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29368", }, ], notes: [ { category: "general", text: "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29368", url: "https://www.suse.com/security/cve/CVE-2020-29368", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179660", }, { category: "external", summary: "SUSE Bug 1179664 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:06:25Z", details: "moderate", }, ], title: "CVE-2020-29368", }, { cve: "CVE-2020-29374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29374", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29374", url: "https://www.suse.com/security/cve/CVE-2020-29374", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:06:25Z", details: "low", }, ], title: "CVE-2020-29374", }, { cve: "CVE-2021-26930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26930", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26930", url: "https://www.suse.com/security/cve/CVE-2021-26930", }, { category: "external", summary: "SUSE Bug 1181843 for CVE-2021-26930", url: "https://bugzilla.suse.com/1181843", }, { category: "external", summary: "SUSE Bug 1182294 for CVE-2021-26930", url: "https://bugzilla.suse.com/1182294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:06:25Z", details: "important", }, ], title: "CVE-2021-26930", }, { cve: "CVE-2021-26931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26931", url: "https://www.suse.com/security/cve/CVE-2021-26931", }, { category: "external", summary: "SUSE Bug 1181753 for CVE-2021-26931", url: "https://bugzilla.suse.com/1181753", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-26931", url: "https://bugzilla.suse.com/1183022", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:06:25Z", details: "moderate", }, ], title: "CVE-2021-26931", }, { cve: "CVE-2021-26932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26932", url: "https://www.suse.com/security/cve/CVE-2021-26932", }, { category: "external", summary: "SUSE Bug 1181747 for CVE-2021-26932", url: "https://bugzilla.suse.com/1181747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.71.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.71.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.71.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:06:25Z", details: "moderate", }, ], title: "CVE-2021-26932", }, ], }
suse-su-2021:0735-1
Vulnerability from csaf_suse
Published
2021-03-09 15:04
Modified
2021-03-09 15:04
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel RT was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially
enable an escalation of privilege via local access (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially
enable a denial of service via local access (bsc#1181735).
- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially
enable a denial of service via local access (bsc#1181736 ).
- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user
to potentially enable a denial of service via local access (bsc#1181738).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access
because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).
The following non-security bugs were fixed:
- ACPICA: Fix exception code class checks (git-fixes).
- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).
- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).
- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).
- ALSA: pcm: Call sync_stop at disconnection (git-fixes).
- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).
- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).
- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).
- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).
- ALSA: usb-audio: More strict state change in EP (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cpcap: fix microphone timeslot mask (git-fixes).
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ASoC: simple-card-utils: Fix device module clock (git-fixes).
- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).
- ata: ahci_brcm: Add back regulators management (git-fixes).
- ata: sata_nv: Fix retrieving of active qcs (git-fixes).
- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- bcache: fix overflow in offset_to_stripe() (git-fixes).
- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).
- blk-mq: insert request not through ->queue_rq into sw/scheduler queue (bsc#1182443).
- blk-mq: move cancel of hctx->run_work to the front of blk_exit_queue (bsc#1182444).
- block: fix inflight statistics of part0 (bsc#1182445).
- block: respect queue limit of max discard segment (bsc#1182441).
- block: virtio_blk: fix handling single range discard request (bsc#1182439).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bnxt_en: Fix accumulation of bp->net_stats_prev (git-fixes).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: set dev->needed_headroom in bond_setup_by_slave() (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).
- bpf, cgroup: Fix problematic bounds check (bsc#1155518).
- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).
- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).
- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- ceph: fix flush_snap logic after putting caps (bsc#1182854).
- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).
- cgroup: fix psi monitor for root cgroup (bsc#1182686).
- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).
- chelsio/chtls: correct function return and return type (git-fixes).
- chelsio/chtls: correct netdevice for vlan interface (git-fixes).
- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).
- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).
- chelsio/chtls: fix deadlock issue (git-fixes).
- chelsio/chtls: fix memory leaks caused by a race (git-fixes).
- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).
- chelsio/chtls: fix panic during unload reload chtls (git-fixes).
- chelsio/chtls: fix socket lock (git-fixes).
- chelsio/chtls: fix tls record info to user (git-fixes).
- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).
- chtls: Added a check to avoid NULL pointer dereference (git-fixes).
- chtls: Fix chtls resources release sequence (git-fixes).
- chtls: Fix hardware tid leak (git-fixes).
- chtls: Fix panic when route to peer not configured (git-fixes).
- chtls: Remove invalid set_tcb call (git-fixes).
- chtls: Replace skb_dequeue with skb_peek (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).
- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).
- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).
- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).
- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).
- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).
- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).
- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in ->remove() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).
- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).
- crypto: ecdh_helper - Ensure 'len >= secret.len' in decode_key() (git-fixes).
- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4: fix all-mask IP address comparison (git-fixes).
- cxgb4: fix checks for max queues to allocate (git-fixes).
- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).
- cxgb4: fix SGE queue dump destination buffer context (git-fixes).
- cxgb4: fix the panic caused by non smac rewrite (git-fixes).
- cxgb4: move DCB version extern to header file (git-fixes).
- cxgb4: move handling L2T ARP failures to caller (git-fixes).
- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).
- cxgb4: parse TC-U32 key values and masks natively (git-fixes).
- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).
- cxgb4: set up filter action after rewrites (git-fixes).
- cxgb4: use correct type for all-mask IP address comparison (git-fixes).
- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).
- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).
- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).
- dm crypt: avoid truncating the logical block size (git-fixes).
- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).
- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).
- dm thin metadata: Avoid returning cmd->bm wild pointer on error (bsc#1177529).
- dm thin metadata: fix lockdep complaint (bsc#1177529).
- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).
- dm: use noio when sending kobject event (bsc#1177529).
- docs: filesystems: vfs: correct flag name (bsc#1182856).
- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).
- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).
- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).
- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).
- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).
- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).
- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).
- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).
- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).
- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).
- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).
- drm/meson: Unbind all connectors on module removal (bsc#1152472)
- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)
- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)
- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)
- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)
- Drop HID logitech patch that caused a regression (bsc#1182259)
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware_loader: align .builtin_fw to 8 (git-fixes).
- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).
- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- gma500: clean up error handling in init (git-fixes).
- gpio: pcf857x: Fix missing first interrupt (git-fixes).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).
- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).
- i2c: stm32f7: fix configuration of the digital filter (git-fixes).
- i3c: master: dw: Drop redundant disec call (git-fixes).
- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).
- i40e: avoid premature Rx buffer reuse (git-fixes).
- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).
- iavf: fix double-release of rtnl_lock (git-fixes).
- iavf: fix error return code in iavf_init_get_resources() (git-fixes).
- iavf: fix speed reporting over virtchnl (git-fixes).
- iavf: Fix updating statistics (git-fixes).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).
- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).
- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).
- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).
- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).
- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).
- igc: fix link speed advertising (git-fixes).
- igc: Fix returning wrong statistics (git-fixes).
- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).
- include/linux/memremap.h: remove stale comments (git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- Input: sur40 - fix an error code in sur40_probe() (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).
- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).
- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).
- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).
- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).
- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).
- iwlwifi: pcie: fix context info memory leak (git-fixes).
- ixgbe: avoid premature Rx buffer reuse (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).
- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).
- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).
- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).
- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).
- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).
- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).
- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).
- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).
- KVM: x86: clear stale x86_emulate_ctxt->intercept value (bsc#1182381).
- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).
- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).
- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).
- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).
- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).
- mac80211: fix fast-rx encryption check (git-fixes).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.
- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).
- matroxfb: avoid -Warray-bounds warning (bsc#1152472)
- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).
- media: camss: missing error code in msm_video_register() (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).
- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).
- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).
- media: lmedm04: Fix misuse of comma (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: mt9v111: Remove unneeded device-managed puts (git-fixes).
- media: pwc: Use correct device for DMA (bsc#1181133).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).
- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).
- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).
- mlxsw: core: Fix memory leak on module removal (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).
- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).
- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).
- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).
- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).
- net: axienet: Fix error return code in axienet_probe() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use hardware padding of runt frames (git-fixes).
- net: broadcom CNIC: requires MMU (git-fixes).
- net: caif: Fix debugfs on 64-bit platforms (git-fixes).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).
- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).
- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: ave: Fix error returns in ave_init (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).
- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).
- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).
- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).
- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).
- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gro: do not keep too many GRO packets in napi->rx_list (bsc#1154353).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).
- net: hns3: add reset check for VF updating port based VLAN (git-fixes).
- net: hns3: clear port base VLAN when unload PF (git-fixes).
- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).
- net: hns3: fix a TX timeout issue (git-fixes).
- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).
- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).
- net: hns3: fix for VLAN config when reset failed (git-fixes).
- net: hns3: fix RSS config lost after VF reset (git-fixes).
- net: hns3: fix set and get link ksettings issue (git-fixes).
- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).
- net: hns3: fix the number of queues actually used by ARQ (git-fixes).
- net: hns3: fix use-after-free when doing self test (git-fixes).
- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).
- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).
- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix init_hca fields offset (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net/mlx5: Add handling of port type in rule deletion (git-fixes).
- net/mlx5: Annotate mutex destroy for root ns (git-fixes).
- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).
- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).
- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).
- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).
- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).
- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).
- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (git-fixes).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).
- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).
- net/mlx5e: Reduce tc unsupported key print level (git-fixes).
- net/mlx5e: Rename hw_modify to preactivate (git-fixes).
- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).
- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).
- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).
- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net/mlx5: Fix deletion of duplicate rules (git-fixes).
- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).
- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).
- net/mlx5: Fix request_irqs error flow (git-fixes).
- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).
- net/mlx5: Query PPS pin operational status before registering it (git-fixes).
- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).
- net: mscc: ocelot: fix address ageing time (again) (git-fixes).
- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).
- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
- net: mvpp2: disable force link UP during port init procedure (git-fixes).
- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).
- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).
- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).
- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).
- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).
- net: octeon: mgmt: Repair filling of RX ring (git-fixes).
- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).
- net: phy: extract link partner advertisement reading (git-fixes).
- net: phy: extract pause mode (git-fixes).
- net: phy: marvell10g: fix null pointer dereference (git-fixes).
- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).
- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).
- net: qca_spi: fix receive buffer size check (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: qede: fix PTP initialization on recovery (git-fixes).
- net: qede: fix use-after-free on recovery and AER handling (git-fixes).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix async event callbacks unregistering (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: re-solve some conflicts after net -> net-next merge (bsc#1176855 ltc#187293).
- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).
- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).
- net: rmnet: fix bridge mode bugs (git-fixes).
- net: rmnet: fix lower interface leak (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).
- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).
- net: rmnet: fix suspicious RCU usage (git-fixes).
- net: rmnet: print error message when command fails (git-fixes).
- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).
- net: rmnet: use upper/lower device infrastructure (git-fixes).
- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: fix disabling flexible PPS output (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: Fix the TX IOC in xmit path (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).
- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).
- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).
- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).
- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).
- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).
- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).
- perf/x86/intel/uncore: With > 8 nodes, get pci bus die id from NUMA info (bsc#1180989).
- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).
- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).
- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).
- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).
- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).
- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).
- qed: select CONFIG_CRC32 (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).
- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)
- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)
- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)
- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).
- RDMA/efa: Count admin commands errors (bsc#1176248).
- RDMA/efa: Count mmap failures (bsc#1176248).
- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).
- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).
- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).
- RDMA/efa: Expose minimum SQ size (bsc#1176248).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).
- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).
- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).
- RDMA/efa: Report create CQ error counter (bsc#1176248).
- RDMA/efa: Report host information to the device (bsc#1176248).
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).
- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).
- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).
- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).
- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).
- regulator: Fix lockdep warning resolving supplies (git-fixes).
- regulator: s5m8767: Drop regulators OF node reference (git-fixes).
- regulator: s5m8767: Fix reference count leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- Remove debug patch for boot failure (bsc#1182602 ltc#190924).
- reset: hisilicon: correct vendor prefix (git-fixes).
- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).
- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).
- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).
- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- rtc: s5m: select REGMAP_I2C (git-fixes).
- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).
- sched: Reenable interrupts in do_sched_yield() (git-fixes)
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).
- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).
- smsc95xx: check return value of smsc95xx_reset (git-fixes).
- soc: aspeed: snoop: Add clock control logic (git-fixes).
- spi: atmel: Put allocated master before return (git-fixes).
- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).
- spi: spi-synquacer: fix set_cs handling (git-fixes).
- spi: stm32: properly handle 0 byte transfer (git-fixes).
- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).
- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).
- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).
- team: set dev->needed_headroom in team_setup_by_port() (git-fixes).
- tpm: Remove tpm_dev_wq_lock (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).
- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).
- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).
- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).
- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).
- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).
- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455).
- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).
- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).
- USB: gadget: u_audio: Free requests only after callback (git-fixes).
- USB: mUSB: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: quirks: sort quirk entries (git-fixes).
- USB: renesas_usbhs: Clear pipe running flag in usbhs_pkt_pop() (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).
- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).
- virtio_net: Fix error code in probe() (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- vxlan: fix memleak of fdb (git-fixes).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).
- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).
- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).
- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).
- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).
- xfs: ratelimit xfs_discard_page messages (bsc#1182283).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).
- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).
- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).
Patchnames
SUSE-2021-735,SUSE-SLE-Module-RT-15-SP2-2021-735
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP2 kernel RT was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).\n- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).\n- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).\n by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).\n- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially \n enable an escalation of privilege via local access (bsc#1181720).\n- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially \n enable a denial of service via local access (bsc#1181735).\n- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially \n enable a denial of service via local access (bsc#1181736 ).\n- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user \n to potentially enable a denial of service via local access (bsc#1181738).\n- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access \n because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Fix exception code class checks (git-fixes).\n- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).\n- ACPI: property: Fix fwnode string properties matching (git-fixes).\n- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).\n- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).\n- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).\n- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).\n- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).\n- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).\n- ALSA: pcm: Call sync_stop at disconnection (git-fixes).\n- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).\n- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).\n- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).\n- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).\n- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).\n- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).\n- ALSA: usb-audio: More strict state change in EP (git-fixes).\n- amba: Fix resource leak for drivers without .remove (git-fixes).\n- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)\n- ASoC: cpcap: fix microphone timeslot mask (git-fixes).\n- ASoC: cs42l56: fix up error handling in probe (git-fixes).\n- ASoC: simple-card-utils: Fix device module clock (git-fixes).\n- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).\n- ata: ahci_brcm: Add back regulators management (git-fixes).\n- ata: sata_nv: Fix retrieving of active qcs (git-fixes).\n- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).\n- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).\n- bcache: fix overflow in offset_to_stripe() (git-fixes).\n- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).\n- blk-mq: insert request not through ->queue_rq into sw/scheduler queue (bsc#1182443).\n- blk-mq: move cancel of hctx->run_work to the front of blk_exit_queue (bsc#1182444).\n- block: fix inflight statistics of part0 (bsc#1182445).\n- block: respect queue limit of max discard segment (bsc#1182441).\n- block: virtio_blk: fix handling single range discard request (bsc#1182439).\n- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).\n- Bluetooth: drop HCI device reference before return (git-fixes).\n- Bluetooth: Fix initializing response id after clearing struct (git-fixes).\n- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).\n- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).\n- bnxt_en: Fix accumulation of bp->net_stats_prev (git-fixes).\n- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).\n- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).\n- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).\n- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).\n- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).\n- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).\n- bonding: set dev->needed_headroom in bond_setup_by_slave() (git-fixes).\n- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).\n- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).\n- bpf, cgroup: Fix problematic bounds check (bsc#1155518).\n- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).\n- btrfs: Cleanup try_flush_qgroup (bsc#1182047).\n- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).\n- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).\n- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).\n- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).\n- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).\n- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).\n- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).\n- caif: no need to check return value of debugfs_create functions (git-fixes).\n- ceph: fix flush_snap logic after putting caps (bsc#1182854).\n- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).\n- cgroup: fix psi monitor for root cgroup (bsc#1182686).\n- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).\n- chelsio/chtls: correct function return and return type (git-fixes).\n- chelsio/chtls: correct netdevice for vlan interface (git-fixes).\n- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).\n- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).\n- chelsio/chtls: fix deadlock issue (git-fixes).\n- chelsio/chtls: fix memory leaks caused by a race (git-fixes).\n- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).\n- chelsio/chtls: fix panic during unload reload chtls (git-fixes).\n- chelsio/chtls: fix socket lock (git-fixes).\n- chelsio/chtls: fix tls record info to user (git-fixes).\n- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).\n- chtls: Added a check to avoid NULL pointer dereference (git-fixes).\n- chtls: Fix chtls resources release sequence (git-fixes).\n- chtls: Fix hardware tid leak (git-fixes).\n- chtls: Fix panic when route to peer not configured (git-fixes).\n- chtls: Remove invalid set_tcb call (git-fixes).\n- chtls: Replace skb_dequeue with skb_peek (git-fixes).\n- cifs: check all path components in resolved dfs target (bsc#1181710).\n- cifs: fix nodfs mount option (bsc#1181710).\n- cifs: introduce helper for finding referral server (bsc#1181710).\n- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).\n- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).\n- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).\n- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).\n- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).\n- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).\n- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).\n- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).\n- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).\n- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).\n- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in ->remove() (git-fixes).\n- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).\n- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).\n- crypto: ecdh_helper - Ensure 'len >= secret.len' in decode_key() (git-fixes).\n- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).\n- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).\n- cxgb4: fix all-mask IP address comparison (git-fixes).\n- cxgb4: fix checks for max queues to allocate (git-fixes).\n- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).\n- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).\n- cxgb4: fix SGE queue dump destination buffer context (git-fixes).\n- cxgb4: fix the panic caused by non smac rewrite (git-fixes).\n- cxgb4: move DCB version extern to header file (git-fixes).\n- cxgb4: move handling L2T ARP failures to caller (git-fixes).\n- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).\n- cxgb4: parse TC-U32 key values and masks natively (git-fixes).\n- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).\n- cxgb4: set up filter action after rewrites (git-fixes).\n- cxgb4: use correct type for all-mask IP address comparison (git-fixes).\n- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).\n- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).\n- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).\n- dmaengine: hsu: disable spurious interrupt (git-fixes).\n- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).\n- dm crypt: avoid truncating the logical block size (git-fixes).\n- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).\n- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).\n- dm thin metadata: Avoid returning cmd->bm wild pointer on error (bsc#1177529).\n- dm thin metadata: fix lockdep complaint (bsc#1177529).\n- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).\n- dm: use noio when sending kobject event (bsc#1177529).\n- docs: filesystems: vfs: correct flag name (bsc#1182856).\n- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).\n- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).\n- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).\n- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).\n- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).\n- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).\n- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).\n- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).\n- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).\n- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).\n- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).\n- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).\n- drm/meson: Unbind all connectors on module removal (bsc#1152472)\n- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)\n- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)\n- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)\n- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)\n- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)\n- Drop HID logitech patch that caused a regression (bsc#1182259) \n- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).\n- ext4: fix a memory leak of ext4_free_data (bsc#1182447).\n- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).\n- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).\n- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).\n- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).\n- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).\n- firmware_loader: align .builtin_fw to 8 (git-fixes).\n- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).\n- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).\n- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).\n- gma500: clean up error handling in init (git-fixes).\n- gpio: pcf857x: Fix missing first interrupt (git-fixes).\n- HID: core: detect and skip invalid inputs to snto32() (git-fixes).\n- HID: make arrays usage and value to be the same (git-fixes).\n- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).\n- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).\n- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).\n- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).\n- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).\n- i2c: stm32f7: fix configuration of the digital filter (git-fixes).\n- i3c: master: dw: Drop redundant disec call (git-fixes).\n- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).\n- i40e: avoid premature Rx buffer reuse (git-fixes).\n- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).\n- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).\n- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).\n- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).\n- iavf: fix double-release of rtnl_lock (git-fixes).\n- iavf: fix error return code in iavf_init_get_resources() (git-fixes).\n- iavf: fix speed reporting over virtchnl (git-fixes).\n- iavf: Fix updating statistics (git-fixes).\n- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).\n- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).\n- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).\n- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: device remove has higher precedence over reset (bsc#1065729).\n- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).\n- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).\n- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).\n- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).\n- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: serialize access to work queue on remove (bsc#1065729).\n- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).\n- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).\n- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).\n- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).\n- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).\n- igc: fix link speed advertising (git-fixes).\n- igc: Fix returning wrong statistics (git-fixes).\n- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).\n- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).\n- include/linux/memremap.h: remove stale comments (git-fixes).\n- Input: elo - fix an error code in elo_connect() (git-fixes).\n- Input: i8042 - unbreak Pegatron C15B (git-fixes).\n- Input: joydev - prevent potential read overflow in ioctl (git-fixes).\n- Input: sur40 - fix an error code in sur40_probe() (git-fixes).\n- Input: xpad - sync supported devices with fork on GitHub (git-fixes).\n- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).\n- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).\n- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).\n- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).\n- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).\n- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).\n- iwlwifi: pcie: fix context info memory leak (git-fixes).\n- ixgbe: avoid premature Rx buffer reuse (git-fixes).\n- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).\n- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: add more data to CSD lock debugging (bsc#1180846).\n- kernel/smp: prepare more CSD lock debugging (bsc#1180846).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).\n- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).\n- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).\n- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).\n- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).\n- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).\n- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).\n- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).\n- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).\n- KVM: x86: clear stale x86_emulate_ctxt->intercept value (bsc#1182381).\n- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).\n- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).\n- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).\n- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).\n- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).\n- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).\n- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).\n- mac80211: fix fast-rx encryption check (git-fixes).\n- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).\n- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.\n- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- matroxfb: avoid -Warray-bounds warning (bsc#1152472)\n- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).\n- media: camss: missing error code in msm_video_register() (git-fixes).\n- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).\n- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).\n- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).\n- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).\n- media: lmedm04: Fix misuse of comma (git-fixes).\n- media: media/pci: Fix memleak in empress_init (git-fixes).\n- media: mt9v111: Remove unneeded device-managed puts (git-fixes).\n- media: pwc: Use correct device for DMA (bsc#1181133).\n- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).\n- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).\n- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).\n- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).\n- media: vsp1: Fix an error handling path in the probe function (git-fixes).\n- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).\n- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).\n- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).\n- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).\n- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).\n- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).\n- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).\n- mlxsw: core: Fix memory leak on module removal (git-fixes).\n- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).\n- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).\n- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).\n- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).\n- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).\n- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).\n- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).\n- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).\n- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).\n- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).\n- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).\n- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).\n- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).\n- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).\n- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).\n- net: axienet: Fix error return code in axienet_probe() (git-fixes).\n- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).\n- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).\n- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).\n- net: bcmgenet: set Rx mode before starting netif (git-fixes).\n- net: bcmgenet: use hardware padding of runt frames (git-fixes).\n- net: broadcom CNIC: requires MMU (git-fixes).\n- net: caif: Fix debugfs on 64-bit platforms (git-fixes).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).\n- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).\n- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).\n- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).\n- net: ethernet: ave: Fix error returns in ave_init (git-fixes).\n- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).\n- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).\n- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).\n- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).\n- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).\n- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).\n- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).\n- net: gro: do not keep too many GRO packets in napi->rx_list (bsc#1154353).\n- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).\n- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).\n- net: hns3: add reset check for VF updating port based VLAN (git-fixes).\n- net: hns3: clear port base VLAN when unload PF (git-fixes).\n- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).\n- net: hns3: fix a TX timeout issue (git-fixes).\n- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).\n- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).\n- net: hns3: fix for VLAN config when reset failed (git-fixes).\n- net: hns3: fix RSS config lost after VF reset (git-fixes).\n- net: hns3: fix set and get link ksettings issue (git-fixes).\n- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).\n- net: hns3: fix the number of queues actually used by ARQ (git-fixes).\n- net: hns3: fix use-after-free when doing self test (git-fixes).\n- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).\n- net: hns: fix return value check in __lb_other_process() (git-fixes).\n- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).\n- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).\n- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).\n- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix init_hca fields offset (git-fixes).\n- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).\n- net/mlx4_en: Handle TX error CQE (bsc#1181854).\n- net/mlx5: Add handling of port type in rule deletion (git-fixes).\n- net/mlx5: Annotate mutex destroy for root ns (git-fixes).\n- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).\n- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).\n- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).\n- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).\n- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).\n- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).\n- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).\n- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).\n- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).\n- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).\n- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).\n- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).\n- net/mlx5e: Fix error path of device attach (git-fixes).\n- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).\n- net/mlx5e: Fix two double free cases (git-fixes).\n- net/mlx5e: Fix VLAN cleanup flow (git-fixes).\n- net/mlx5e: Fix VLAN create flow (git-fixes).\n- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).\n- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).\n- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).\n- net/mlx5e: Reduce tc unsupported key print level (git-fixes).\n- net/mlx5e: Rename hw_modify to preactivate (git-fixes).\n- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).\n- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).\n- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).\n- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).\n- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).\n- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).\n- net/mlx5: Fix deletion of duplicate rules (git-fixes).\n- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).\n- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).\n- net/mlx5: Fix request_irqs error flow (git-fixes).\n- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).\n- net/mlx5: Query PPS pin operational status before registering it (git-fixes).\n- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).\n- net: moxa: Fix a potential double 'free_irq()' (git-fixes).\n- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).\n- net: mscc: ocelot: fix address ageing time (again) (git-fixes).\n- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).\n- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).\n- net: mvpp2: disable force link UP during port init procedure (git-fixes).\n- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).\n- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).\n- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).\n- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).\n- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).\n- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).\n- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).\n- net: octeon: mgmt: Repair filling of RX ring (git-fixes).\n- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).\n- net: phy: extract link partner advertisement reading (git-fixes).\n- net: phy: extract pause mode (git-fixes).\n- net: phy: marvell10g: fix null pointer dereference (git-fixes).\n- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).\n- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).\n- net: qca_spi: fix receive buffer size check (git-fixes).\n- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).\n- net: qede: fix PTP initialization on recovery (git-fixes).\n- net: qede: fix use-after-free on recovery and AER handling (git-fixes).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix async event callbacks unregistering (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix 'maybe uninitialized' warning (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qed: RDMA personality shouldn't fail VF load (git-fixes).\n- net: re-solve some conflicts after net -> net-next merge (bsc#1176855 ltc#187293).\n- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).\n- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).\n- net: rmnet: fix bridge mode bugs (git-fixes).\n- net: rmnet: fix lower interface leak (git-fixes).\n- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).\n- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).\n- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).\n- net: rmnet: fix suspicious RCU usage (git-fixes).\n- net: rmnet: print error message when command fails (git-fixes).\n- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).\n- net: rmnet: use upper/lower device infrastructure (git-fixes).\n- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).\n- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).\n- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).\n- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).\n- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).\n- net: stmmac: Do not accept invalid MTU values (git-fixes).\n- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).\n- net: stmmac: Enable 16KB buffer size (git-fixes).\n- net: stmmac: fix disabling flexible PPS output (git-fixes).\n- net: stmmac: fix length of PTP clock's name string (git-fixes).\n- net: stmmac: Fix the TX IOC in xmit path (git-fixes).\n- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).\n- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).\n- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).\n- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).\n- net: sun: fix missing release regions in cas_init_one() (git-fixes).\n- net: team: fix memory leak in __team_options_register (git-fixes).\n- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).\n- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).\n- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).\n- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).\n- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).\n- objtool: Do not fail on missing symbol table (bsc#1169514).\n- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).\n- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).\n- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).\n- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).\n- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).\n- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).\n- perf/x86/intel/uncore: With > 8 nodes, get pci bus die id from NUMA info (bsc#1180989).\n- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).\n- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).\n- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).\n- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).\n- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).\n- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).\n- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).\n- powerpc: Fix alignment bug within the init sections (bsc#1065729).\n- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).\n- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).\n- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).\n- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).\n- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).\n- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).\n- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).\n- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).\n- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).\n- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).\n- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).\n- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).\n- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).\n- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).\n- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).\n- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).\n- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).\n- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).\n- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).\n- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).\n- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).\n- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).\n- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).\n- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).\n- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).\n- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).\n- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).\n- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).\n- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).\n- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).\n- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).\n- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).\n- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).\n- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).\n- qed: select CONFIG_CRC32 (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).\n- quota: Sanity-check quota file headers on load (bsc#1182461).\n- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).\n- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)\n- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)\n- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)\n- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).\n- RDMA/efa: Count admin commands errors (bsc#1176248).\n- RDMA/efa: Count mmap failures (bsc#1176248).\n- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).\n- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).\n- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).\n- RDMA/efa: Expose minimum SQ size (bsc#1176248).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).\n- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).\n- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).\n- RDMA/efa: Report create CQ error counter (bsc#1176248).\n- RDMA/efa: Report host information to the device (bsc#1176248).\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).\n- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).\n- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).\n- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).\n- regulator: axp20x: Fix reference cout leak (git-fixes).\n- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).\n- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).\n- regulator: Fix lockdep warning resolving supplies (git-fixes).\n- regulator: s5m8767: Drop regulators OF node reference (git-fixes).\n- regulator: s5m8767: Fix reference count leak (git-fixes).\n- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).\n- Remove debug patch for boot failure (bsc#1182602 ltc#190924). \n- reset: hisilicon: correct vendor prefix (git-fixes).\n- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).\n- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).\n- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).\n- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)\n- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)\n- rtc: s5m: select REGMAP_I2C (git-fixes).\n- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).\n- sched: Reenable interrupts in do_sched_yield() (git-fixes)\n- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).\n- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).\n- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).\n- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).\n- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).\n- smsc95xx: check return value of smsc95xx_reset (git-fixes).\n- soc: aspeed: snoop: Add clock control logic (git-fixes).\n- spi: atmel: Put allocated master before return (git-fixes).\n- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).\n- spi: spi-synquacer: fix set_cs handling (git-fixes).\n- spi: stm32: properly handle 0 byte transfer (git-fixes).\n- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).\n- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).\n- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).\n- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).\n- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).\n- team: set dev->needed_headroom in team_setup_by_port() (git-fixes).\n- tpm: Remove tpm_dev_wq_lock (git-fixes).\n- tpm_tis: Clean up locality release (git-fixes).\n- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).\n- tracing: Check length before giving out the filter buffer (git-fixes).\n- tracing: Do not count ftrace events in top level enable output (git-fixes).\n- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).\n- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).\n- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).\n- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).\n- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).\n- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).\n- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).\n- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455). \n- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).\n- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).\n- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)\n- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).\n- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).\n- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).\n- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).\n- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).\n- USB: gadget: u_audio: Free requests only after callback (git-fixes).\n- USB: mUSB: Fix runtime PM race in musb_queue_resume_work (git-fixes).\n- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).\n- USB: quirks: sort quirk entries (git-fixes).\n- USB: renesas_usbhs: Clear pipe running flag in usbhs_pkt_pop() (git-fixes).\n- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).\n- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).\n- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).\n- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).\n- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).\n- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).\n- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).\n- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).\n- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).\n- virtio_net: Fix error code in probe() (git-fixes).\n- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).\n- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).\n- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).\n- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).\n- vxlan: fix memleak of fdb (git-fixes).\n- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).\n- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).\n- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).\n- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).\n- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).\n- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).\n- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).\n- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).\n- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).\n- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).\n- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).\n- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).\n- xfs: ratelimit xfs_discard_page messages (bsc#1182283).\n- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).\n- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).\n- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).\n- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).\n- xhci: fix bounce buffer usage for non-sg list case (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-735,SUSE-SLE-Module-RT-15-SP2-2021-735", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0735-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0735-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210735-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0735-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1078720", url: "https://bugzilla.suse.com/1078720", }, { category: "self", summary: "SUSE Bug 1081134", url: "https://bugzilla.suse.com/1081134", }, { category: "self", summary: "SUSE Bug 1084610", url: "https://bugzilla.suse.com/1084610", }, { category: "self", summary: "SUSE Bug 1132477", url: "https://bugzilla.suse.com/1132477", }, { category: "self", summary: "SUSE Bug 1151927", url: "https://bugzilla.suse.com/1151927", }, { category: "self", summary: "SUSE Bug 1152472", url: "https://bugzilla.suse.com/1152472", }, { category: "self", summary: "SUSE Bug 1152489", url: "https://bugzilla.suse.com/1152489", }, { category: "self", summary: "SUSE Bug 1154353", url: "https://bugzilla.suse.com/1154353", }, { category: "self", summary: "SUSE Bug 1155518", url: "https://bugzilla.suse.com/1155518", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1163776", url: "https://bugzilla.suse.com/1163776", }, { category: "self", summary: "SUSE Bug 1169514", url: "https://bugzilla.suse.com/1169514", }, { category: "self", summary: "SUSE Bug 1170442", url: "https://bugzilla.suse.com/1170442", }, { category: "self", summary: "SUSE Bug 1176248", url: "https://bugzilla.suse.com/1176248", }, { category: "self", summary: "SUSE Bug 1176855", url: "https://bugzilla.suse.com/1176855", }, { category: "self", summary: "SUSE Bug 1177109", url: "https://bugzilla.suse.com/1177109", }, { category: "self", summary: "SUSE Bug 1177326", url: "https://bugzilla.suse.com/1177326", }, { category: "self", summary: "SUSE Bug 1177440", url: "https://bugzilla.suse.com/1177440", }, { category: "self", summary: "SUSE Bug 1177529", url: "https://bugzilla.suse.com/1177529", }, { category: "self", summary: "SUSE Bug 1178142", url: "https://bugzilla.suse.com/1178142", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179137", url: "https://bugzilla.suse.com/1179137", }, { category: "self", summary: "SUSE Bug 1179243", url: "https://bugzilla.suse.com/1179243", }, { category: "self", summary: "SUSE Bug 1179428", url: "https://bugzilla.suse.com/1179428", }, { category: "self", summary: "SUSE Bug 1179660", url: "https://bugzilla.suse.com/1179660", }, { category: "self", summary: "SUSE Bug 1179929", url: "https://bugzilla.suse.com/1179929", }, { category: "self", summary: "SUSE Bug 1180058", url: "https://bugzilla.suse.com/1180058", }, { category: "self", summary: "SUSE Bug 1180846", url: "https://bugzilla.suse.com/1180846", }, { category: "self", summary: "SUSE Bug 1180989", url: "https://bugzilla.suse.com/1180989", }, { category: "self", summary: "SUSE Bug 1181133", url: "https://bugzilla.suse.com/1181133", }, { category: "self", summary: "SUSE Bug 1181259", url: "https://bugzilla.suse.com/1181259", }, { category: "self", summary: "SUSE Bug 1181574", url: "https://bugzilla.suse.com/1181574", }, { category: "self", summary: "SUSE Bug 1181637", url: "https://bugzilla.suse.com/1181637", }, { category: "self", summary: "SUSE Bug 1181655", url: "https://bugzilla.suse.com/1181655", }, { category: "self", summary: "SUSE Bug 1181671", url: "https://bugzilla.suse.com/1181671", }, { category: "self", summary: "SUSE Bug 1181674", url: "https://bugzilla.suse.com/1181674", }, { category: "self", summary: "SUSE Bug 1181710", url: "https://bugzilla.suse.com/1181710", }, { category: "self", summary: "SUSE Bug 1181720", url: "https://bugzilla.suse.com/1181720", }, { category: "self", summary: "SUSE Bug 1181735", url: "https://bugzilla.suse.com/1181735", }, { category: "self", summary: "SUSE Bug 1181736", url: "https://bugzilla.suse.com/1181736", }, { category: "self", summary: "SUSE Bug 1181738", url: "https://bugzilla.suse.com/1181738", }, { category: "self", summary: "SUSE Bug 1181747", url: "https://bugzilla.suse.com/1181747", }, { category: "self", summary: "SUSE Bug 1181753", url: "https://bugzilla.suse.com/1181753", }, { category: "self", summary: "SUSE Bug 1181818", url: "https://bugzilla.suse.com/1181818", }, { category: "self", summary: "SUSE Bug 1181843", url: "https://bugzilla.suse.com/1181843", }, { category: "self", summary: "SUSE Bug 1181854", url: "https://bugzilla.suse.com/1181854", }, { category: "self", summary: "SUSE Bug 1181896", url: "https://bugzilla.suse.com/1181896", }, { category: "self", summary: "SUSE Bug 1181958", url: "https://bugzilla.suse.com/1181958", }, { category: "self", summary: "SUSE Bug 1181960", url: "https://bugzilla.suse.com/1181960", }, { category: "self", summary: "SUSE Bug 1181985", url: "https://bugzilla.suse.com/1181985", }, { category: "self", summary: "SUSE Bug 1182047", url: "https://bugzilla.suse.com/1182047", }, { category: "self", summary: "SUSE Bug 1182118", url: "https://bugzilla.suse.com/1182118", }, { category: "self", summary: "SUSE Bug 1182128", url: "https://bugzilla.suse.com/1182128", }, { category: "self", summary: "SUSE Bug 1182140", url: "https://bugzilla.suse.com/1182140", }, { category: "self", summary: "SUSE Bug 1182171", url: "https://bugzilla.suse.com/1182171", }, { category: "self", summary: "SUSE Bug 1182175", url: "https://bugzilla.suse.com/1182175", }, { category: "self", summary: "SUSE Bug 1182259", url: "https://bugzilla.suse.com/1182259", }, { category: "self", summary: "SUSE Bug 1182265", url: "https://bugzilla.suse.com/1182265", }, { category: "self", summary: "SUSE Bug 1182266", url: "https://bugzilla.suse.com/1182266", }, { category: "self", summary: "SUSE Bug 1182267", url: "https://bugzilla.suse.com/1182267", }, { category: "self", summary: "SUSE Bug 1182268", url: "https://bugzilla.suse.com/1182268", }, { category: "self", summary: "SUSE Bug 1182271", url: "https://bugzilla.suse.com/1182271", }, { category: "self", summary: "SUSE Bug 1182272", url: "https://bugzilla.suse.com/1182272", }, { category: "self", summary: "SUSE Bug 1182273", url: "https://bugzilla.suse.com/1182273", }, { category: "self", summary: "SUSE Bug 1182275", url: "https://bugzilla.suse.com/1182275", }, { category: "self", summary: "SUSE Bug 1182276", url: "https://bugzilla.suse.com/1182276", }, { category: "self", summary: "SUSE Bug 1182278", url: "https://bugzilla.suse.com/1182278", }, { category: "self", summary: "SUSE Bug 1182283", url: "https://bugzilla.suse.com/1182283", }, { category: "self", summary: "SUSE Bug 1182374", url: "https://bugzilla.suse.com/1182374", }, { category: "self", summary: "SUSE Bug 1182380", url: "https://bugzilla.suse.com/1182380", }, { category: "self", summary: "SUSE Bug 1182381", url: "https://bugzilla.suse.com/1182381", }, { category: "self", summary: "SUSE Bug 1182406", url: "https://bugzilla.suse.com/1182406", }, { category: "self", summary: "SUSE Bug 1182430", url: "https://bugzilla.suse.com/1182430", }, { category: "self", summary: "SUSE Bug 1182439", url: "https://bugzilla.suse.com/1182439", }, { category: "self", summary: "SUSE Bug 1182441", url: "https://bugzilla.suse.com/1182441", }, { category: "self", summary: "SUSE Bug 1182442", url: "https://bugzilla.suse.com/1182442", }, { category: "self", summary: "SUSE Bug 1182443", url: "https://bugzilla.suse.com/1182443", }, { category: "self", summary: "SUSE Bug 1182444", url: "https://bugzilla.suse.com/1182444", }, { category: "self", summary: "SUSE Bug 1182445", url: "https://bugzilla.suse.com/1182445", }, { category: "self", summary: "SUSE Bug 1182446", url: "https://bugzilla.suse.com/1182446", }, { category: "self", summary: "SUSE Bug 1182447", url: "https://bugzilla.suse.com/1182447", }, { category: "self", summary: "SUSE Bug 1182449", url: "https://bugzilla.suse.com/1182449", }, { category: "self", summary: "SUSE Bug 1182454", url: "https://bugzilla.suse.com/1182454", }, { category: "self", summary: "SUSE Bug 1182455", url: "https://bugzilla.suse.com/1182455", }, { category: "self", summary: "SUSE Bug 1182456", url: "https://bugzilla.suse.com/1182456", }, { category: "self", summary: "SUSE Bug 1182457", url: "https://bugzilla.suse.com/1182457", }, { category: "self", summary: "SUSE Bug 1182458", url: "https://bugzilla.suse.com/1182458", }, { category: "self", summary: "SUSE Bug 1182459", url: "https://bugzilla.suse.com/1182459", }, { category: "self", summary: "SUSE Bug 1182460", url: "https://bugzilla.suse.com/1182460", }, { category: "self", summary: "SUSE Bug 1182461", url: "https://bugzilla.suse.com/1182461", }, { category: "self", summary: "SUSE Bug 1182462", url: "https://bugzilla.suse.com/1182462", }, { category: "self", summary: "SUSE Bug 1182463", url: "https://bugzilla.suse.com/1182463", }, { category: "self", summary: "SUSE Bug 1182464", url: "https://bugzilla.suse.com/1182464", }, { category: "self", summary: "SUSE Bug 1182465", url: "https://bugzilla.suse.com/1182465", }, { category: "self", summary: "SUSE Bug 1182466", url: "https://bugzilla.suse.com/1182466", }, { category: "self", summary: "SUSE Bug 1182485", url: "https://bugzilla.suse.com/1182485", }, { category: "self", summary: "SUSE Bug 1182489", url: "https://bugzilla.suse.com/1182489", }, { category: "self", summary: "SUSE Bug 1182490", url: "https://bugzilla.suse.com/1182490", }, { category: "self", summary: "SUSE Bug 1182547", url: "https://bugzilla.suse.com/1182547", }, { category: "self", summary: "SUSE Bug 1182558", url: "https://bugzilla.suse.com/1182558", }, { category: "self", summary: "SUSE Bug 1182560", url: "https://bugzilla.suse.com/1182560", }, { category: "self", summary: "SUSE Bug 1182561", url: "https://bugzilla.suse.com/1182561", }, { category: "self", summary: "SUSE Bug 1182571", url: "https://bugzilla.suse.com/1182571", }, { category: "self", summary: "SUSE Bug 1182599", url: "https://bugzilla.suse.com/1182599", }, { category: "self", summary: "SUSE Bug 1182602", url: "https://bugzilla.suse.com/1182602", }, { category: "self", summary: "SUSE Bug 1182626", url: "https://bugzilla.suse.com/1182626", }, { category: "self", summary: "SUSE Bug 1182650", url: "https://bugzilla.suse.com/1182650", }, { category: "self", summary: "SUSE Bug 1182672", url: "https://bugzilla.suse.com/1182672", }, { category: "self", summary: "SUSE Bug 1182676", url: "https://bugzilla.suse.com/1182676", }, { category: "self", summary: "SUSE Bug 1182683", url: "https://bugzilla.suse.com/1182683", }, { category: "self", summary: "SUSE Bug 1182684", url: "https://bugzilla.suse.com/1182684", }, { category: "self", summary: "SUSE Bug 1182686", url: "https://bugzilla.suse.com/1182686", }, { category: "self", summary: "SUSE Bug 1182770", url: "https://bugzilla.suse.com/1182770", }, { category: "self", summary: "SUSE Bug 1182798", url: "https://bugzilla.suse.com/1182798", }, { category: "self", summary: "SUSE Bug 1182800", url: "https://bugzilla.suse.com/1182800", }, { category: "self", summary: "SUSE Bug 1182801", url: "https://bugzilla.suse.com/1182801", }, { category: "self", summary: "SUSE Bug 1182854", url: "https://bugzilla.suse.com/1182854", }, { category: "self", summary: "SUSE Bug 1182856", url: "https://bugzilla.suse.com/1182856", }, { category: "self", summary: "SUSE Bug 1183022", url: "https://bugzilla.suse.com/1183022", }, { category: "self", summary: "SUSE CVE CVE-2020-12362 page", url: "https://www.suse.com/security/cve/CVE-2020-12362/", }, { category: "self", summary: "SUSE CVE CVE-2020-12363 page", url: "https://www.suse.com/security/cve/CVE-2020-12363/", }, { category: "self", summary: "SUSE CVE CVE-2020-12364 page", url: "https://www.suse.com/security/cve/CVE-2020-12364/", }, { category: "self", summary: "SUSE CVE CVE-2020-12373 page", url: "https://www.suse.com/security/cve/CVE-2020-12373/", }, { category: "self", summary: "SUSE CVE CVE-2020-29368 page", url: "https://www.suse.com/security/cve/CVE-2020-29368/", }, { category: "self", summary: "SUSE CVE CVE-2020-29374 page", url: "https://www.suse.com/security/cve/CVE-2020-29374/", }, { category: "self", summary: "SUSE CVE CVE-2021-26930 page", url: "https://www.suse.com/security/cve/CVE-2021-26930/", }, { category: "self", summary: "SUSE CVE CVE-2021-26931 page", url: "https://www.suse.com/security/cve/CVE-2021-26931/", }, { category: "self", summary: "SUSE CVE CVE-2021-26932 page", url: "https://www.suse.com/security/cve/CVE-2021-26932/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-03-09T15:04:57Z", generator: { date: "2021-03-09T15:04:57Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0735-1", initial_release_date: "2021-03-09T15:04:57Z", revision_history: [ { date: "2021-03-09T15:04:57Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.3.18-28.1.noarch", product: { name: "kernel-devel-rt-5.3.18-28.1.noarch", product_id: "kernel-devel-rt-5.3.18-28.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.3.18-28.1.noarch", product: { name: "kernel-source-rt-5.3.18-28.1.noarch", product_id: "kernel-source-rt-5.3.18-28.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.3.18-28.1.x86_64", product: { name: "cluster-md-kmp-rt-5.3.18-28.1.x86_64", product_id: "cluster-md-kmp-rt-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-5.3.18-28.1.x86_64", product: { name: "cluster-md-kmp-rt_debug-5.3.18-28.1.x86_64", product_id: "cluster-md-kmp-rt_debug-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.3.18-28.1.x86_64", product: { name: "dlm-kmp-rt-5.3.18-28.1.x86_64", product_id: "dlm-kmp-rt-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-5.3.18-28.1.x86_64", product: { name: "dlm-kmp-rt_debug-5.3.18-28.1.x86_64", product_id: "dlm-kmp-rt_debug-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.3.18-28.1.x86_64", product: { name: "gfs2-kmp-rt-5.3.18-28.1.x86_64", product_id: "gfs2-kmp-rt-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-5.3.18-28.1.x86_64", product: { name: "gfs2-kmp-rt_debug-5.3.18-28.1.x86_64", product_id: "gfs2-kmp-rt_debug-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.3.18-28.1.x86_64", product: { name: "kernel-rt-5.3.18-28.1.x86_64", product_id: "kernel-rt-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.3.18-28.1.x86_64", product: { name: "kernel-rt-devel-5.3.18-28.1.x86_64", product_id: "kernel-rt-devel-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.3.18-28.1.x86_64", product: { name: "kernel-rt-extra-5.3.18-28.1.x86_64", product_id: "kernel-rt-extra-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.3.18-28.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.3.18-28.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.3.18-28.1.x86_64", product: { name: "kernel-rt_debug-5.3.18-28.1.x86_64", product_id: "kernel-rt_debug-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.3.18-28.1.x86_64", product: { name: "kernel-rt_debug-devel-5.3.18-28.1.x86_64", product_id: "kernel-rt_debug-devel-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-5.3.18-28.1.x86_64", product: { name: "kernel-rt_debug-extra-5.3.18-28.1.x86_64", product_id: "kernel-rt_debug-extra-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.3.18-28.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.3.18-28.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.3.18-28.1.x86_64", product: { name: "kernel-syms-rt-5.3.18-28.1.x86_64", product_id: "kernel-syms-rt-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.3.18-28.1.x86_64", product: { name: "kselftests-kmp-rt-5.3.18-28.1.x86_64", product_id: "kselftests-kmp-rt-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-5.3.18-28.1.x86_64", product: { name: "kselftests-kmp-rt_debug-5.3.18-28.1.x86_64", product_id: "kselftests-kmp-rt_debug-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.3.18-28.1.x86_64", product: { name: "ocfs2-kmp-rt-5.3.18-28.1.x86_64", product_id: "ocfs2-kmp-rt-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-5.3.18-28.1.x86_64", product: { name: "ocfs2-kmp-rt_debug-5.3.18-28.1.x86_64", product_id: "ocfs2-kmp-rt_debug-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.3.18-28.1.x86_64", product: { name: "reiserfs-kmp-rt-5.3.18-28.1.x86_64", product_id: "reiserfs-kmp-rt-5.3.18-28.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt_debug-5.3.18-28.1.x86_64", product: { name: "reiserfs-kmp-rt_debug-5.3.18-28.1.x86_64", product_id: "reiserfs-kmp-rt_debug-5.3.18-28.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Real Time Module 15 SP2", product: { name: "SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.3.18-28.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.3.18-28.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.3.18-28.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", }, product_reference: "dlm-kmp-rt-5.3.18-28.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.3.18-28.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.3.18-28.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.3.18-28.1.noarch as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", }, product_reference: "kernel-devel-rt-5.3.18-28.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-28.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", }, product_reference: "kernel-rt-5.3.18-28.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.3.18-28.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", }, product_reference: "kernel-rt-devel-5.3.18-28.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.3.18-28.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.3.18-28.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.3.18-28.1.noarch as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", }, product_reference: "kernel-source-rt-5.3.18-28.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.3.18-28.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", }, product_reference: "kernel-syms-rt-5.3.18-28.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.3.18-28.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.3.18-28.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2020-12362", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12362", }, ], notes: [ { category: "general", text: "Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12362", url: "https://www.suse.com/security/cve/CVE-2020-12362", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12362", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1182033 for CVE-2020-12362", url: "https://bugzilla.suse.com/1182033", }, { category: "external", summary: "SUSE Bug 1190859 for CVE-2020-12362", url: "https://bugzilla.suse.com/1190859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:04:57Z", details: "important", }, ], title: "CVE-2020-12362", }, { cve: "CVE-2020-12363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12363", }, ], notes: [ { category: "general", text: "Improper input validation in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12363", url: "https://www.suse.com/security/cve/CVE-2020-12363", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12363", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1181735 for CVE-2020-12363", url: "https://bugzilla.suse.com/1181735", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:04:57Z", details: "low", }, ], title: "CVE-2020-12363", }, { cve: "CVE-2020-12364", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12364", }, ], notes: [ { category: "general", text: "Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12364", url: "https://www.suse.com/security/cve/CVE-2020-12364", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12364", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1181736 for CVE-2020-12364", url: "https://bugzilla.suse.com/1181736", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:04:57Z", details: "low", }, ], title: "CVE-2020-12364", }, { cve: "CVE-2020-12373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12373", }, ], notes: [ { category: "general", text: "Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12373", url: "https://www.suse.com/security/cve/CVE-2020-12373", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12373", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1181738 for CVE-2020-12373", url: "https://bugzilla.suse.com/1181738", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:04:57Z", details: "low", }, ], title: "CVE-2020-12373", }, { cve: "CVE-2020-29368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29368", }, ], notes: [ { category: "general", text: "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29368", url: "https://www.suse.com/security/cve/CVE-2020-29368", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179660", }, { category: "external", summary: "SUSE Bug 1179664 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:04:57Z", details: "moderate", }, ], title: "CVE-2020-29368", }, { cve: "CVE-2020-29374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29374", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29374", url: "https://www.suse.com/security/cve/CVE-2020-29374", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:04:57Z", details: "low", }, ], title: "CVE-2020-29374", }, { cve: "CVE-2021-26930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26930", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26930", url: "https://www.suse.com/security/cve/CVE-2021-26930", }, { category: "external", summary: "SUSE Bug 1181843 for CVE-2021-26930", url: "https://bugzilla.suse.com/1181843", }, { category: "external", summary: "SUSE Bug 1182294 for CVE-2021-26930", url: "https://bugzilla.suse.com/1182294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:04:57Z", details: "important", }, ], title: "CVE-2021-26930", }, { cve: "CVE-2021-26931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26931", url: "https://www.suse.com/security/cve/CVE-2021-26931", }, { category: "external", summary: "SUSE Bug 1181753 for CVE-2021-26931", url: "https://bugzilla.suse.com/1181753", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-26931", url: "https://bugzilla.suse.com/1183022", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:04:57Z", details: "moderate", }, ], title: "CVE-2021-26931", }, { cve: "CVE-2021-26932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26932", url: "https://www.suse.com/security/cve/CVE-2021-26932", }, { category: "external", summary: "SUSE Bug 1181747 for CVE-2021-26932", url: "https://bugzilla.suse.com/1181747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-28.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-28.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-28.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-09T15:04:57Z", details: "moderate", }, ], title: "CVE-2021-26932", }, ], }
WID-SEC-W-2023-2841
Vulnerability from csaf_certbund
Published
2023-11-06 23:00
Modified
2023-12-05 23:00
Summary
Samsung Android: Mehrere Schwachstellen ermöglichen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter Angreifer kann mehrere Schwachstellen in Samsung Android ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren.
Betroffene Betriebssysteme
- Android
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter Angreifer kann mehrere Schwachstellen in Samsung Android ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren.", title: "Angriff", }, { category: "general", text: "- Android", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2841 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2841.json", }, { category: "self", summary: "WID-SEC-2023-2841 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2841", }, { category: "external", summary: "CISA Known Exploited Vulnerabilities Catalog vom 2023-12-05", url: "https://www.cisa.gov/news-events/alerts/2023/12/05/cisa-adds-four-known-exploited-vulnerabilities-catalog", }, { category: "external", summary: "Samsung Security Update vom 2023-11-06", url: "https://security.samsungmobile.com/securityUpdate.smsb", }, ], source_lang: "en-US", title: "Samsung Android: Mehrere Schwachstellen ermöglichen", tracking: { current_release_date: "2023-12-05T23:00:00.000+00:00", generator: { date: "2024-08-15T18:01:12.771+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2841", initial_release_date: "2023-11-06T23:00:00.000+00:00", revision_history: [ { date: "2023-11-06T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-12-05T23:00:00.000+00:00", number: "2", summary: "Aktive Ausnutzung gemeldet", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Samsung Android < 11 SMR Nov-2023 Release 1", product: { name: "Samsung Android < 11 SMR Nov-2023 Release 1", product_id: "T030954", product_identification_helper: { cpe: "cpe:/o:samsung:android:11_smr_nov-2023_release_1", }, }, }, { category: "product_name", name: "Samsung Android < 12 SMR Nov-2023 Release 1", product: { name: "Samsung Android < 12 SMR Nov-2023 Release 1", product_id: "T030955", product_identification_helper: { cpe: "cpe:/o:samsung:android:12_smr_nov-2023_release_1", }, }, }, { category: "product_name", name: "Samsung Android < 13 SMR Nov-2023 Release 1", product: { name: "Samsung Android < 13 SMR Nov-2023 Release 1", product_id: "T030956", product_identification_helper: { cpe: "cpe:/o:samsung:android:13_smr_nov-2023_release_1", }, }, }, ], category: "product_name", name: "Android", }, ], category: "vendor", name: "Samsung", }, ], }, vulnerabilities: [ { cve: "CVE-2023-41112", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-41112", }, { cve: "CVE-2023-41111", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-41111", }, { cve: "CVE-2023-40638", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40638", }, { cve: "CVE-2023-40124", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40124", }, { cve: "CVE-2023-40115", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40115", }, { cve: "CVE-2023-40114", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40114", }, { cve: "CVE-2023-40113", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40113", }, { cve: "CVE-2023-40112", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40112", }, { cve: "CVE-2023-40111", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40111", }, { cve: "CVE-2023-40110", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40110", }, { cve: "CVE-2023-40109", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40109", }, { cve: "CVE-2023-40107", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40107", }, { cve: "CVE-2023-40106", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40106", }, { cve: "CVE-2023-40105", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40105", }, { cve: "CVE-2023-40104", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40104", }, { cve: "CVE-2023-40100", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40100", }, { cve: "CVE-2023-34970", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-34970", }, { cve: "CVE-2023-33200", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33200", }, { cve: "CVE-2023-33107", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33107", }, { cve: "CVE-2023-33106", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33106", }, { cve: "CVE-2023-33063", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33063", }, { cve: "CVE-2023-33035", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33035", }, { cve: "CVE-2023-33034", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33034", }, { cve: "CVE-2023-33029", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33029", }, { cve: "CVE-2023-33028", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33028", }, { cve: "CVE-2023-33027", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33027", }, { cve: "CVE-2023-33026", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33026", }, { cve: "CVE-2023-32820", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-32820", }, { cve: "CVE-2023-32819", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-32819", }, { cve: "CVE-2023-30739", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-30739", }, { cve: "CVE-2023-28540", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-28540", }, { cve: "CVE-2023-24855", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24855", }, { cve: "CVE-2023-24853", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24853", }, { cve: "CVE-2023-24850", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24850", }, { cve: "CVE-2023-24849", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24849", }, { cve: "CVE-2023-24848", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24848", }, { cve: "CVE-2023-24847", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24847", }, { cve: "CVE-2023-24844", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24844", }, { cve: "CVE-2023-24843", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24843", }, { cve: "CVE-2023-22385", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-22385", }, { cve: "CVE-2023-21673", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-21673", }, { cve: "CVE-2023-21234", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-21234", }, { cve: "CVE-2023-21111", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-21111", }, { cve: "CVE-2023-21103", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-21103", }, { cve: "CVE-2023-20819", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-20819", }, { cve: "CVE-2022-28348", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2022-28348", }, { cve: "CVE-2022-22071", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2022-22071", }, { cve: "CVE-2021-44828", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2021-44828", }, { cve: "CVE-2020-29374", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2020-29374", }, { cve: "CVE-2023-4863", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-4863", }, { cve: "CVE-2023-42538", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42538", }, { cve: "CVE-2023-42537", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42537", }, { cve: "CVE-2023-42536", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42536", }, { cve: "CVE-2023-42535", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42535", }, { cve: "CVE-2023-42534", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42534", }, { cve: "CVE-2023-42533", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42533", }, { cve: "CVE-2023-42532", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42532", }, { cve: "CVE-2023-42531", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42531", }, { cve: "CVE-2023-42530", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42530", }, { cve: "CVE-2023-42529", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42529", }, { cve: "CVE-2023-42528", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42528", }, { cve: "CVE-2023-42527", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42527", }, { cve: "CVE-2023-4211", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-4211", }, ], }
wid-sec-w-2023-2272
Vulnerability from csaf_certbund
Published
2023-09-05 22:00
Modified
2023-09-05 22:00
Summary
Samsung Android: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Samsung Android ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Android
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Samsung Android ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen.", title: "Angriff", }, { category: "general", text: "- Android", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2272 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2272.json", }, { category: "self", summary: "WID-SEC-2023-2272 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2272", }, { category: "external", summary: "Samsung Security Advisory vom 2023-09-05", url: "https://security.samsungmobile.com/securityUpdate.smsb", }, ], source_lang: "en-US", title: "Samsung Android: Mehrere Schwachstellen", tracking: { current_release_date: "2023-09-05T22:00:00.000+00:00", generator: { date: "2024-08-15T17:58:05.198+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2272", initial_release_date: "2023-09-05T22:00:00.000+00:00", revision_history: [ { date: "2023-09-05T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Samsung Android <= 13", product: { name: "Samsung Android <= 13", product_id: "T029730", product_identification_helper: { cpe: "cpe:/o:samsung:android:13", }, }, }, ], category: "vendor", name: "Samsung", }, ], }, vulnerabilities: [ { cve: "CVE-2023-40353", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-40353", }, { cve: "CVE-2023-37377", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-37377", }, { cve: "CVE-2023-37368", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-37368", }, { cve: "CVE-2023-37367", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-37367", }, { cve: "CVE-2023-35687", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35687", }, { cve: "CVE-2023-35684", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35684", }, { cve: "CVE-2023-35683", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35683", }, { cve: "CVE-2023-35682", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35682", }, { cve: "CVE-2023-35681", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35681", }, { cve: "CVE-2023-35679", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35679", }, { cve: "CVE-2023-35677", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35677", }, { cve: "CVE-2023-35676", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35676", }, { cve: "CVE-2023-35675", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35675", }, { cve: "CVE-2023-35674", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35674", }, { cve: "CVE-2023-35673", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35673", }, { cve: "CVE-2023-35671", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35671", }, { cve: "CVE-2023-35670", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35670", }, { cve: "CVE-2023-35669", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35669", }, { cve: "CVE-2023-35667", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35667", }, { cve: "CVE-2023-35666", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35666", }, { cve: "CVE-2023-35658", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35658", }, { cve: "CVE-2023-30721", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30721", }, { cve: "CVE-2023-30720", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30720", }, { cve: "CVE-2023-30719", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30719", }, { cve: "CVE-2023-30718", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30718", }, { cve: "CVE-2023-30717", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30717", }, { cve: "CVE-2023-30716", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30716", }, { cve: "CVE-2023-30715", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30715", }, { cve: "CVE-2023-30714", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30714", }, { cve: "CVE-2023-30713", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30713", }, { cve: "CVE-2023-30712", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30712", }, { cve: "CVE-2023-30711", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30711", }, { cve: "CVE-2023-30710", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30710", }, { cve: "CVE-2023-30709", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30709", }, { cve: "CVE-2023-30708", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30708", }, { cve: "CVE-2023-30707", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30707", }, { cve: "CVE-2023-30706", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30706", }, { cve: "CVE-2023-21626", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-21626", }, { cve: "CVE-2023-21135", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-21135", }, { cve: "CVE-2023-21118", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-21118", }, { cve: "CVE-2023-20780", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-20780", }, { cve: "CVE-2022-40510", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2022-40510", }, { cve: "CVE-2020-29374", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2020-29374", }, ], }
WID-SEC-W-2023-1984
Vulnerability from csaf_certbund
Published
2023-08-07 22:00
Modified
2023-09-19 22:00
Summary
Google Android: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1984 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1984.json", }, { category: "self", summary: "WID-SEC-2023-1984 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1984", }, { category: "external", summary: "Ubuntu Security Notice USN-6383-1 vom 2023-09-19", url: "https://ubuntu.com/security/notices/USN-6383-1", }, { category: "external", summary: "Pixel Patchday August 2023 vom 2023-08-07", url: "https://source.android.com/docs/security/bulletin/pixel/2023-08-01", }, { category: "external", summary: "Android Patchday August 2023 vom 2023-08-07", url: "https://source.android.com/docs/security/bulletin/2023-08-01", }, ], source_lang: "en-US", title: "Google Android: Mehrere Schwachstellen", tracking: { current_release_date: "2023-09-19T22:00:00.000+00:00", generator: { date: "2024-08-15T17:56:40.270+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1984", initial_release_date: "2023-08-07T22:00:00.000+00:00", revision_history: [ { date: "2023-08-07T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-09-19T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Google Android 11", product: { name: "Google Android 11", product_id: "T019739", product_identification_helper: { cpe: "cpe:/o:google:android:11", }, }, }, { category: "product_name", name: "Google Android 12", product: { name: "Google Android 12", product_id: "T020881", product_identification_helper: { cpe: "cpe:/o:google:android:12", }, }, }, { category: "product_name", name: "Google Android 13", product: { name: "Google Android 13", product_id: "T024488", product_identification_helper: { cpe: "cpe:/o:google:android:13", }, }, }, { category: "product_name", name: "Google Android 12L", product: { name: "Google Android 12L", product_id: "T029115", product_identification_helper: { cpe: "cpe:/o:google:android:12l", }, }, }, ], category: "product_name", name: "Android", }, ], category: "vendor", name: "Google", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2023-28555", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-28555", }, { cve: "CVE-2023-28537", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-28537", }, { cve: "CVE-2023-22666", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-22666", }, { cve: "CVE-2023-21650", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21650", }, { cve: "CVE-2023-21649", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21649", }, { cve: "CVE-2023-21648", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21648", }, { cve: "CVE-2023-21647", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21647", }, { cve: "CVE-2023-21627", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21627", }, { cve: "CVE-2023-21626", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21626", }, { cve: "CVE-2023-21292", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21292", }, { cve: "CVE-2023-21290", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21290", }, { cve: "CVE-2023-21289", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21289", }, { cve: "CVE-2023-21288", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21288", }, { cve: "CVE-2023-21287", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21287", }, { cve: "CVE-2023-21286", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21286", }, { cve: "CVE-2023-21285", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21285", }, { cve: "CVE-2023-21284", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21284", }, { cve: "CVE-2023-21283", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21283", }, { cve: "CVE-2023-21282", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21282", }, { cve: "CVE-2023-21281", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21281", }, { cve: "CVE-2023-21280", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21280", }, { cve: "CVE-2023-21279", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21279", }, { cve: "CVE-2023-21278", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21278", }, { cve: "CVE-2023-21277", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21277", }, { cve: "CVE-2023-21276", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21276", }, { cve: "CVE-2023-21275", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21275", }, { cve: "CVE-2023-21274", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21274", }, { cve: "CVE-2023-21273", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21273", }, { cve: "CVE-2023-21272", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21272", }, { cve: "CVE-2023-21271", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21271", }, { cve: "CVE-2023-21270", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21270", }, { cve: "CVE-2023-21269", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21269", }, { cve: "CVE-2023-21268", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21268", }, { cve: "CVE-2023-21267", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21267", }, { cve: "CVE-2023-21265", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21265", }, { cve: "CVE-2023-21264", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21264", }, { cve: "CVE-2023-21242", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21242", }, { cve: "CVE-2023-21175", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21175", }, { cve: "CVE-2023-21142", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21142", }, { cve: "CVE-2023-21140", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21140", }, { cve: "CVE-2023-21134", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21134", }, { cve: "CVE-2023-21133", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21133", }, { cve: "CVE-2023-21132", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21132", }, { cve: "CVE-2023-20965", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-20965", }, { cve: "CVE-2023-20780", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-20780", }, { cve: "CVE-2022-40510", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2022-40510", }, { cve: "CVE-2022-34830", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2022-34830", }, { cve: "CVE-2020-29374", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2020-29374", }, ], }
wid-sec-w-2023-2841
Vulnerability from csaf_certbund
Published
2023-11-06 23:00
Modified
2023-12-05 23:00
Summary
Samsung Android: Mehrere Schwachstellen ermöglichen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter Angreifer kann mehrere Schwachstellen in Samsung Android ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren.
Betroffene Betriebssysteme
- Android
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter Angreifer kann mehrere Schwachstellen in Samsung Android ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren.", title: "Angriff", }, { category: "general", text: "- Android", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2841 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2841.json", }, { category: "self", summary: "WID-SEC-2023-2841 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2841", }, { category: "external", summary: "CISA Known Exploited Vulnerabilities Catalog vom 2023-12-05", url: "https://www.cisa.gov/news-events/alerts/2023/12/05/cisa-adds-four-known-exploited-vulnerabilities-catalog", }, { category: "external", summary: "Samsung Security Update vom 2023-11-06", url: "https://security.samsungmobile.com/securityUpdate.smsb", }, ], source_lang: "en-US", title: "Samsung Android: Mehrere Schwachstellen ermöglichen", tracking: { current_release_date: "2023-12-05T23:00:00.000+00:00", generator: { date: "2024-08-15T18:01:12.771+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2841", initial_release_date: "2023-11-06T23:00:00.000+00:00", revision_history: [ { date: "2023-11-06T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-12-05T23:00:00.000+00:00", number: "2", summary: "Aktive Ausnutzung gemeldet", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Samsung Android < 11 SMR Nov-2023 Release 1", product: { name: "Samsung Android < 11 SMR Nov-2023 Release 1", product_id: "T030954", product_identification_helper: { cpe: "cpe:/o:samsung:android:11_smr_nov-2023_release_1", }, }, }, { category: "product_name", name: "Samsung Android < 12 SMR Nov-2023 Release 1", product: { name: "Samsung Android < 12 SMR Nov-2023 Release 1", product_id: "T030955", product_identification_helper: { cpe: "cpe:/o:samsung:android:12_smr_nov-2023_release_1", }, }, }, { category: "product_name", name: "Samsung Android < 13 SMR Nov-2023 Release 1", product: { name: "Samsung Android < 13 SMR Nov-2023 Release 1", product_id: "T030956", product_identification_helper: { cpe: "cpe:/o:samsung:android:13_smr_nov-2023_release_1", }, }, }, ], category: "product_name", name: "Android", }, ], category: "vendor", name: "Samsung", }, ], }, vulnerabilities: [ { cve: "CVE-2023-41112", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-41112", }, { cve: "CVE-2023-41111", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-41111", }, { cve: "CVE-2023-40638", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40638", }, { cve: "CVE-2023-40124", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40124", }, { cve: "CVE-2023-40115", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40115", }, { cve: "CVE-2023-40114", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40114", }, { cve: "CVE-2023-40113", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40113", }, { cve: "CVE-2023-40112", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40112", }, { cve: "CVE-2023-40111", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40111", }, { cve: "CVE-2023-40110", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40110", }, { cve: "CVE-2023-40109", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40109", }, { cve: "CVE-2023-40107", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40107", }, { cve: "CVE-2023-40106", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40106", }, { cve: "CVE-2023-40105", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40105", }, { cve: "CVE-2023-40104", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40104", }, { cve: "CVE-2023-40100", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-40100", }, { cve: "CVE-2023-34970", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-34970", }, { cve: "CVE-2023-33200", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33200", }, { cve: "CVE-2023-33107", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33107", }, { cve: "CVE-2023-33106", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33106", }, { cve: "CVE-2023-33063", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33063", }, { cve: "CVE-2023-33035", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33035", }, { cve: "CVE-2023-33034", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33034", }, { cve: "CVE-2023-33029", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33029", }, { cve: "CVE-2023-33028", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33028", }, { cve: "CVE-2023-33027", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33027", }, { cve: "CVE-2023-33026", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-33026", }, { cve: "CVE-2023-32820", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-32820", }, { cve: "CVE-2023-32819", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-32819", }, { cve: "CVE-2023-30739", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-30739", }, { cve: "CVE-2023-28540", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-28540", }, { cve: "CVE-2023-24855", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24855", }, { cve: "CVE-2023-24853", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24853", }, { cve: "CVE-2023-24850", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24850", }, { cve: "CVE-2023-24849", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24849", }, { cve: "CVE-2023-24848", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24848", }, { cve: "CVE-2023-24847", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24847", }, { cve: "CVE-2023-24844", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24844", }, { cve: "CVE-2023-24843", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-24843", }, { cve: "CVE-2023-22385", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-22385", }, { cve: "CVE-2023-21673", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-21673", }, { cve: "CVE-2023-21234", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-21234", }, { cve: "CVE-2023-21111", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-21111", }, { cve: "CVE-2023-21103", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-21103", }, { cve: "CVE-2023-20819", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-20819", }, { cve: "CVE-2022-28348", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2022-28348", }, { cve: "CVE-2022-22071", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2022-22071", }, { cve: "CVE-2021-44828", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2021-44828", }, { cve: "CVE-2020-29374", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2020-29374", }, { cve: "CVE-2023-4863", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-4863", }, { cve: "CVE-2023-42538", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42538", }, { cve: "CVE-2023-42537", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42537", }, { cve: "CVE-2023-42536", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42536", }, { cve: "CVE-2023-42535", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42535", }, { cve: "CVE-2023-42534", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42534", }, { cve: "CVE-2023-42533", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42533", }, { cve: "CVE-2023-42532", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42532", }, { cve: "CVE-2023-42531", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42531", }, { cve: "CVE-2023-42530", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42530", }, { cve: "CVE-2023-42529", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42529", }, { cve: "CVE-2023-42528", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42528", }, { cve: "CVE-2023-42527", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-42527", }, { cve: "CVE-2023-4211", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen in mehreren Komponenten wie SecSettings, SmsController oder der USB-Gadget-Schnittstelle aufgrund einer unsachgemäßen Eingabe- und Zertifikatsvalidierung, unsachgemäßer Zugriffskontrolle und anderen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen oder Dateien zu manipulieren. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um sie erfolgreich auszunutzen.", }, ], release_date: "2023-11-06T23:00:00.000+00:00", title: "CVE-2023-4211", }, ], }
WID-SEC-W-2023-2272
Vulnerability from csaf_certbund
Published
2023-09-05 22:00
Modified
2023-09-05 22:00
Summary
Samsung Android: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Samsung Android ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Android
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Samsung Android ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen.", title: "Angriff", }, { category: "general", text: "- Android", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2272 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2272.json", }, { category: "self", summary: "WID-SEC-2023-2272 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2272", }, { category: "external", summary: "Samsung Security Advisory vom 2023-09-05", url: "https://security.samsungmobile.com/securityUpdate.smsb", }, ], source_lang: "en-US", title: "Samsung Android: Mehrere Schwachstellen", tracking: { current_release_date: "2023-09-05T22:00:00.000+00:00", generator: { date: "2024-08-15T17:58:05.198+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2272", initial_release_date: "2023-09-05T22:00:00.000+00:00", revision_history: [ { date: "2023-09-05T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Samsung Android <= 13", product: { name: "Samsung Android <= 13", product_id: "T029730", product_identification_helper: { cpe: "cpe:/o:samsung:android:13", }, }, }, ], category: "vendor", name: "Samsung", }, ], }, vulnerabilities: [ { cve: "CVE-2023-40353", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-40353", }, { cve: "CVE-2023-37377", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-37377", }, { cve: "CVE-2023-37368", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-37368", }, { cve: "CVE-2023-37367", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-37367", }, { cve: "CVE-2023-35687", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35687", }, { cve: "CVE-2023-35684", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35684", }, { cve: "CVE-2023-35683", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35683", }, { cve: "CVE-2023-35682", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35682", }, { cve: "CVE-2023-35681", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35681", }, { cve: "CVE-2023-35679", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35679", }, { cve: "CVE-2023-35677", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35677", }, { cve: "CVE-2023-35676", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35676", }, { cve: "CVE-2023-35675", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35675", }, { cve: "CVE-2023-35674", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35674", }, { cve: "CVE-2023-35673", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35673", }, { cve: "CVE-2023-35671", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35671", }, { cve: "CVE-2023-35670", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35670", }, { cve: "CVE-2023-35669", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35669", }, { cve: "CVE-2023-35667", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35667", }, { cve: "CVE-2023-35666", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35666", }, { cve: "CVE-2023-35658", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-35658", }, { cve: "CVE-2023-30721", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30721", }, { cve: "CVE-2023-30720", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30720", }, { cve: "CVE-2023-30719", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30719", }, { cve: "CVE-2023-30718", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30718", }, { cve: "CVE-2023-30717", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30717", }, { cve: "CVE-2023-30716", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30716", }, { cve: "CVE-2023-30715", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30715", }, { cve: "CVE-2023-30714", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30714", }, { cve: "CVE-2023-30713", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30713", }, { cve: "CVE-2023-30712", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30712", }, { cve: "CVE-2023-30711", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30711", }, { cve: "CVE-2023-30710", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30710", }, { cve: "CVE-2023-30709", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30709", }, { cve: "CVE-2023-30708", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30708", }, { cve: "CVE-2023-30707", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30707", }, { cve: "CVE-2023-30706", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-30706", }, { cve: "CVE-2023-21626", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-21626", }, { cve: "CVE-2023-21135", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-21135", }, { cve: "CVE-2023-21118", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-21118", }, { cve: "CVE-2023-20780", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2023-20780", }, { cve: "CVE-2022-40510", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2022-40510", }, { cve: "CVE-2020-29374", notes: [ { category: "description", text: "Es bestehen mehrere Schwachstellen in Samsung Android. Diese Fehler bestehen unter anderem in Tastatur, SecSettings, Dual Messenger, Knox AI, Telefon- und Nachrichtenspeicher, Einstellungsvorschlägen, One UI Home und Wetter aufgrund einer unsachgemäßen Autorisierung, einer unsachgemäßen Eingabevalidierung, einer unsachgemäßen Authentifizierung, einer unsachgemäßen Eingabevalidierung und einer unsachgemäßen Zugriffskontrolle. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, seine Privilegien zu erweitern, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und beliebigen Code auszuführen. Für eine erfolgreiche Ausnutzung kann eine Benutzerinteraktion erforderlich sein.", }, ], product_status: { last_affected: [ "T029730", ], }, release_date: "2023-09-05T22:00:00.000+00:00", title: "CVE-2020-29374", }, ], }
wid-sec-w-2023-1984
Vulnerability from csaf_certbund
Published
2023-08-07 22:00
Modified
2023-09-19 22:00
Summary
Google Android: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1984 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1984.json", }, { category: "self", summary: "WID-SEC-2023-1984 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1984", }, { category: "external", summary: "Ubuntu Security Notice USN-6383-1 vom 2023-09-19", url: "https://ubuntu.com/security/notices/USN-6383-1", }, { category: "external", summary: "Pixel Patchday August 2023 vom 2023-08-07", url: "https://source.android.com/docs/security/bulletin/pixel/2023-08-01", }, { category: "external", summary: "Android Patchday August 2023 vom 2023-08-07", url: "https://source.android.com/docs/security/bulletin/2023-08-01", }, ], source_lang: "en-US", title: "Google Android: Mehrere Schwachstellen", tracking: { current_release_date: "2023-09-19T22:00:00.000+00:00", generator: { date: "2024-08-15T17:56:40.270+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1984", initial_release_date: "2023-08-07T22:00:00.000+00:00", revision_history: [ { date: "2023-08-07T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-09-19T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Google Android 11", product: { name: "Google Android 11", product_id: "T019739", product_identification_helper: { cpe: "cpe:/o:google:android:11", }, }, }, { category: "product_name", name: "Google Android 12", product: { name: "Google Android 12", product_id: "T020881", product_identification_helper: { cpe: "cpe:/o:google:android:12", }, }, }, { category: "product_name", name: "Google Android 13", product: { name: "Google Android 13", product_id: "T024488", product_identification_helper: { cpe: "cpe:/o:google:android:13", }, }, }, { category: "product_name", name: "Google Android 12L", product: { name: "Google Android 12L", product_id: "T029115", product_identification_helper: { cpe: "cpe:/o:google:android:12l", }, }, }, ], category: "product_name", name: "Android", }, ], category: "vendor", name: "Google", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2023-28555", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-28555", }, { cve: "CVE-2023-28537", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-28537", }, { cve: "CVE-2023-22666", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-22666", }, { cve: "CVE-2023-21650", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21650", }, { cve: "CVE-2023-21649", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21649", }, { cve: "CVE-2023-21648", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21648", }, { cve: "CVE-2023-21647", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21647", }, { cve: "CVE-2023-21627", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21627", }, { cve: "CVE-2023-21626", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21626", }, { cve: "CVE-2023-21292", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21292", }, { cve: "CVE-2023-21290", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21290", }, { cve: "CVE-2023-21289", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21289", }, { cve: "CVE-2023-21288", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21288", }, { cve: "CVE-2023-21287", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21287", }, { cve: "CVE-2023-21286", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21286", }, { cve: "CVE-2023-21285", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21285", }, { cve: "CVE-2023-21284", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21284", }, { cve: "CVE-2023-21283", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21283", }, { cve: "CVE-2023-21282", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21282", }, { cve: "CVE-2023-21281", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21281", }, { cve: "CVE-2023-21280", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21280", }, { cve: "CVE-2023-21279", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21279", }, { cve: "CVE-2023-21278", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21278", }, { cve: "CVE-2023-21277", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21277", }, { cve: "CVE-2023-21276", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21276", }, { cve: "CVE-2023-21275", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21275", }, { cve: "CVE-2023-21274", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21274", }, { cve: "CVE-2023-21273", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21273", }, { cve: "CVE-2023-21272", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21272", }, { cve: "CVE-2023-21271", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21271", }, { cve: "CVE-2023-21270", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21270", }, { cve: "CVE-2023-21269", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21269", }, { cve: "CVE-2023-21268", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21268", }, { cve: "CVE-2023-21267", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21267", }, { cve: "CVE-2023-21265", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21265", }, { cve: "CVE-2023-21264", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21264", }, { cve: "CVE-2023-21242", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21242", }, { cve: "CVE-2023-21175", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21175", }, { cve: "CVE-2023-21142", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21142", }, { cve: "CVE-2023-21140", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21140", }, { cve: "CVE-2023-21134", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21134", }, { cve: "CVE-2023-21133", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21133", }, { cve: "CVE-2023-21132", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-21132", }, { cve: "CVE-2023-20965", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-20965", }, { cve: "CVE-2023-20780", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2023-20780", }, { cve: "CVE-2022-40510", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2022-40510", }, { cve: "CVE-2022-34830", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2022-34830", }, { cve: "CVE-2020-29374", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Android Runtime\", \"Framework\", \"Media Framework\", \"System\", \"Google Play system updates\", \"Kernel\", \"ARM components\", \"MediaTek components\", \"Qualcomm closed-source components\" sowie \"Qualcomm components\". Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "T019739", "T024488", "T020881", "T029115", ], }, release_date: "2023-08-07T22:00:00.000+00:00", title: "CVE-2020-29374", }, ], }
fkie_cve-2020-29374
Vulnerability from fkie_nvd
Published
2020-11-28 07:15
Modified
2024-11-21 05:23
Severity ?
Summary
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
netapp | 500f_firmware | - | |
netapp | 500f | - | |
netapp | a250_firmware | - | |
netapp | a250 | - | |
netapp | h410c_firmware | - | |
netapp | h410c | - | |
netapp | solidfire_\&_hci_management_node | - | |
netapp | solidfire_\&_hci_storage_node | - | |
netapp | hci_compute_node_bios | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "9D2A5683-E016-4DD2-9AB1-D538551B122F", versionEndExcluding: "5.7.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECF32BB1-9A58-4821-AE49-5D5C8200631F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*", matchCriteriaId: "F21DE67F-CDFD-4D36-9967-633CD0240C6F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1236B66D-EB11-4324-929F-E2B86683C3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*", matchCriteriaId: "281DFC67-46BB-4FC2-BE03-3C65C9311F65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", matchCriteriaId: "CDDF61B7-EC5C-467C-B710-B89F502CD04F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", matchCriteriaId: "D6D700C5-F67F-4FFB-BE69-D524592A3D2E", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:solidfire_\\&_hci_storage_node:-:*:*:*:*:*:*:*", matchCriteriaId: "D452B464-1200-4B72-9A89-42DC58486191", vulnerable: true, }, { criteria: "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*", matchCriteriaId: "7C61DF9A-ABDE-44A2-A060-B088428D5064", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", }, { lang: "es", value: "Se detectó un problema en el kernel de Linux versiones anteriores a 5.7.3, relacionado con los archivos mm/gup.c y mm/huge_memory.c. La implementación de la función get_user_pages (también se conoce como gup), cuando se usa para una página copy-on-write, no considera apropiadamente la semántica de las operaciones de lectura y, por lo tanto, puede otorgar acceso de escritura involuntario, también se conoce como CID-17839856fd58", }, ], id: "CVE-2020-29374", lastModified: "2024-11-21T05:23:56.503", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 3.3, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1, impactScore: 2.5, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-28T07:15:11.960", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=2045", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Third Party Advisory", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20210115-0002/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5096", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=2045", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Third Party Advisory", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20210115-0002/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5096", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-362", }, { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
ghsa-7jw3-9qpg-fmp6
Vulnerability from github
Published
2022-05-24 17:35
Modified
2022-05-24 17:35
Severity ?
Details
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.
{ affected: [], aliases: [ "CVE-2020-29374", ], database_specific: { cwe_ids: [ "CWE-362", "CWE-863", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2020-11-28T07:15:00Z", severity: "HIGH", }, details: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", id: "GHSA-7jw3-9qpg-fmp6", modified: "2022-05-24T17:35:04Z", published: "2022-05-24T17:35:04Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-29374", }, { type: "WEB", url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=2045", }, { type: "WEB", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3", }, { type: "WEB", url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20210115-0002", }, { type: "WEB", url: "https://www.debian.org/security/2022/dsa-5096", }, { type: "WEB", url: "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", type: "CVSS_V3", }, ], }
opensuse-su-2021:0393-1
Vulnerability from csaf_opensuse
Published
2021-03-08 07:14
Modified
2021-03-08 07:14
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Linux Leap 15.2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially
enable an escalation of privilege via local access (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially
enable a denial of service via local access (bsc#1181735).
- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially
enable a denial of service via local access (bsc#1181736 ).
- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user
to potentially enable a denial of service via local access (bsc#1181738).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access
because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).
The following non-security bugs were fixed:
- ACPICA: Fix exception code class checks (git-fixes).
- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).
- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).
- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).
- ALSA: pcm: Call sync_stop at disconnection (git-fixes).
- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).
- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).
- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).
- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).
- ALSA: usb-audio: More strict state change in EP (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- armv7hl: lpae: Update config files. Disable KVM support (bsc#1182697)
- ASoC: cpcap: fix microphone timeslot mask (git-fixes).
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ASoC: simple-card-utils: Fix device module clock (git-fixes).
- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).
- ata: ahci_brcm: Add back regulators management (git-fixes).
- ata: sata_nv: Fix retrieving of active qcs (git-fixes).
- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- bcache: fix overflow in offset_to_stripe() (git-fixes).
- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).
- blk-mq: insert request not through ->queue_rq into sw/scheduler queue (bsc#1182443).
- blk-mq: move cancel of hctx->run_work to the front of blk_exit_queue (bsc#1182444).
- block: fix inflight statistics of part0 (bsc#1182445).
- block: respect queue limit of max discard segment (bsc#1182441).
- block: virtio_blk: fix handling single range discard request (bsc#1182439).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bnxt_en: Fix accumulation of bp->net_stats_prev (git-fixes).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: set dev->needed_headroom in bond_setup_by_slave() (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).
- bpf, cgroup: Fix problematic bounds check (bsc#1155518).
- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).
- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).
- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- ceph: fix flush_snap logic after putting caps (bsc#1182854).
- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).
- cgroup: fix psi monitor for root cgroup (bsc#1182686).
- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).
- chelsio/chtls: correct function return and return type (git-fixes).
- chelsio/chtls: correct netdevice for vlan interface (git-fixes).
- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).
- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).
- chelsio/chtls: fix deadlock issue (git-fixes).
- chelsio/chtls: fix memory leaks caused by a race (git-fixes).
- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).
- chelsio/chtls: fix panic during unload reload chtls (git-fixes).
- chelsio/chtls: fix socket lock (git-fixes).
- chelsio/chtls: fix tls record info to user (git-fixes).
- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).
- chtls: Added a check to avoid NULL pointer dereference (git-fixes).
- chtls: Fix chtls resources release sequence (git-fixes).
- chtls: Fix hardware tid leak (git-fixes).
- chtls: Fix panic when route to peer not configured (git-fixes).
- chtls: Remove invalid set_tcb call (git-fixes).
- chtls: Replace skb_dequeue with skb_peek (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).
- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).
- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).
- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).
- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).
- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).
- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).
- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in ->remove() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).
- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).
- crypto: ecdh_helper - Ensure 'len >= secret.len' in decode_key() (git-fixes).
- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4: fix all-mask IP address comparison (git-fixes).
- cxgb4: fix checks for max queues to allocate (git-fixes).
- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).
- cxgb4: fix SGE queue dump destination buffer context (git-fixes).
- cxgb4: fix the panic caused by non smac rewrite (git-fixes).
- cxgb4: move DCB version extern to header file (git-fixes).
- cxgb4: move handling L2T ARP failures to caller (git-fixes).
- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).
- cxgb4: parse TC-U32 key values and masks natively (git-fixes).
- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).
- cxgb4: set up filter action after rewrites (git-fixes).
- cxgb4: use correct type for all-mask IP address comparison (git-fixes).
- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).
- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).
- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).
- dm crypt: avoid truncating the logical block size (git-fixes).
- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).
- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).
- dm thin metadata: Avoid returning cmd->bm wild pointer on error (bsc#1177529).
- dm thin metadata: fix lockdep complaint (bsc#1177529).
- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).
- dm: use noio when sending kobject event (bsc#1177529).
- docs: filesystems: vfs: correct flag name (bsc#1182856).
- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).
- Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).
- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).
- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).
- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).
- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).
- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).
- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).
- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).
- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).
- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).
- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).
- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).
- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).
- drm/meson: Unbind all connectors on module removal (bsc#1152472)
- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)
- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)
- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)
- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)
- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).
- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware_loader: align .builtin_fw to 8 (git-fixes).
- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).
- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- gma500: clean up error handling in init (git-fixes).
- gpio: pcf857x: Fix missing first interrupt (git-fixes).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).
- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).
- i2c: stm32f7: fix configuration of the digital filter (git-fixes).
- i3c: master: dw: Drop redundant disec call (git-fixes).
- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).
- i40e: avoid premature Rx buffer reuse (git-fixes).
- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).
- iavf: fix double-release of rtnl_lock (git-fixes).
- iavf: fix error return code in iavf_init_get_resources() (git-fixes).
- iavf: fix speed reporting over virtchnl (git-fixes).
- iavf: Fix updating statistics (git-fixes).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).
- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).
- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).
- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).
- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).
- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).
- igc: fix link speed advertising (git-fixes).
- igc: Fix returning wrong statistics (git-fixes).
- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).
- include/linux/memremap.h: remove stale comments (git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- Input: sur40 - fix an error code in sur40_probe() (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).
- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).
- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).
- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).
- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).
- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).
- iwlwifi: pcie: fix context info memory leak (git-fixes).
- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).
- ixgbe: avoid premature Rx buffer reuse (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).
- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).
- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).
- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).
- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).
- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).
- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).
- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).
- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).
- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).
- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).
- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).
- KVM: x86: clear stale x86_emulate_ctxt->intercept value (bsc#1182381).
- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).
- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).
- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).
- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).
- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).
- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).
- mac80211: fix fast-rx encryption check (git-fixes).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- mac80211: pause TX while changing interface type (git-fixes).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.
- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).
- matroxfb: avoid -Warray-bounds warning (bsc#1152472)
- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).
- media: camss: missing error code in msm_video_register() (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).
- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).
- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).
- media: lmedm04: Fix misuse of comma (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: mt9v111: Remove unneeded device-managed puts (git-fixes).
- media: pwc: Use correct device for DMA (bsc#1181133).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).
- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).
- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).
- mlxsw: core: Fix memory leak on module removal (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).
- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).
- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).
- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).
- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).
- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).
- net: axienet: Fix error return code in axienet_probe() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use hardware padding of runt frames (git-fixes).
- net: broadcom CNIC: requires MMU (git-fixes).
- net: caif: Fix debugfs on 64-bit platforms (git-fixes).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).
- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).
- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: ave: Fix error returns in ave_init (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).
- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).
- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).
- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).
- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).
- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gro: do not keep too many GRO packets in napi->rx_list (bsc#1154353).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).
- net: hns3: add reset check for VF updating port based VLAN (git-fixes).
- net: hns3: clear port base VLAN when unload PF (git-fixes).
- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).
- net: hns3: fix a TX timeout issue (git-fixes).
- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).
- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).
- net: hns3: fix for VLAN config when reset failed (git-fixes).
- net: hns3: fix RSS config lost after VF reset (git-fixes).
- net: hns3: fix set and get link ksettings issue (git-fixes).
- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).
- net: hns3: fix the number of queues actually used by ARQ (git-fixes).
- net: hns3: fix use-after-free when doing self test (git-fixes).
- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).
- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).
- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix init_hca fields offset (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net/mlx5: Add handling of port type in rule deletion (git-fixes).
- net/mlx5: Annotate mutex destroy for root ns (git-fixes).
- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).
- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).
- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).
- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).
- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).
- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).
- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (git-fixes).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).
- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).
- net/mlx5e: Reduce tc unsupported key print level (git-fixes).
- net/mlx5e: Rename hw_modify to preactivate (git-fixes).
- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).
- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).
- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).
- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net/mlx5: Fix deletion of duplicate rules (git-fixes).
- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).
- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).
- net/mlx5: Fix request_irqs error flow (git-fixes).
- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).
- net/mlx5: Query PPS pin operational status before registering it (git-fixes).
- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).
- net: mscc: ocelot: fix address ageing time (again) (git-fixes).
- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).
- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
- net: mvpp2: disable force link UP during port init procedure (git-fixes).
- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).
- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).
- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).
- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).
- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).
- net: octeon: mgmt: Repair filling of RX ring (git-fixes).
- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).
- net: phy: extract link partner advertisement reading (git-fixes).
- net: phy: extract pause mode (git-fixes).
- net: phy: marvell10g: fix null pointer dereference (git-fixes).
- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).
- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).
- net: qca_spi: fix receive buffer size check (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: qede: fix PTP initialization on recovery (git-fixes).
- net: qede: fix use-after-free on recovery and AER handling (git-fixes).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix async event callbacks unregistering (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: re-solve some conflicts after net -> net-next merge (bsc#1176855 ltc#187293).
- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).
- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).
- net: rmnet: fix bridge mode bugs (git-fixes).
- net: rmnet: fix lower interface leak (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).
- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).
- net: rmnet: fix suspicious RCU usage (git-fixes).
- net: rmnet: print error message when command fails (git-fixes).
- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).
- net: rmnet: use upper/lower device infrastructure (git-fixes).
- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: fix disabling flexible PPS output (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: Fix the TX IOC in xmit path (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).
- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).
- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).
- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).
- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).
- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).
- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).
- perf/x86/intel/uncore: With > 8 nodes, get pci bus die id from NUMA info (bsc#1180989).
- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).
- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).
- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).
- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).
- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).
- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).
- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).
- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).
- qed: select CONFIG_CRC32 (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).
- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).
- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)
- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)
- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)
- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).
- RDMA/efa: Count admin commands errors (bsc#1176248).
- RDMA/efa: Count mmap failures (bsc#1176248).
- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).
- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).
- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).
- RDMA/efa: Expose minimum SQ size (bsc#1176248).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).
- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).
- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).
- RDMA/efa: Report create CQ error counter (bsc#1176248).
- RDMA/efa: Report host information to the device (bsc#1176248).
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).
- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).
- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).
- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).
- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).
- regulator: Fix lockdep warning resolving supplies (git-fixes).
- regulator: s5m8767: Drop regulators OF node reference (git-fixes).
- regulator: s5m8767: Fix reference count leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- Remove debug patch for boot failure (bsc#1182602 ltc#190924).
- reset: hisilicon: correct vendor prefix (git-fixes).
- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).
- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).
- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).
- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- rtc: s5m: select REGMAP_I2C (git-fixes).
- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).
- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).
- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).
- sched: Reenable interrupts in do_sched_yield() (git-fixes)
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).
- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).
- smsc95xx: check return value of smsc95xx_reset (git-fixes).
- soc: aspeed: snoop: Add clock control logic (git-fixes).
- spi: atmel: Put allocated master before return (git-fixes).
- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).
- spi: spi-synquacer: fix set_cs handling (git-fixes).
- spi: stm32: properly handle 0 byte transfer (git-fixes).
- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).
- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).
- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).
- team: set dev->needed_headroom in team_setup_by_port() (git-fixes).
- tpm: Remove tpm_dev_wq_lock (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).
- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).
- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).
- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).
- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).
- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).
- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455).
- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: armv7hl: Set ledtrig-default-on as builtin (bsc#1182128)
- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).
- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).
- USB: gadget: u_audio: Free requests only after callback (git-fixes).
- USB: musb: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: quirks: sort quirk entries (git-fixes).
- USB: renesas_usbhs: Clear pipe running flag in usbhs_pkt_pop() (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).
- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).
- virtio_net: Fix error code in probe() (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- vxlan: fix memleak of fdb (git-fixes).
- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).
- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).
- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).
- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).
- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).
- xfs: ratelimit xfs_discard_page messages (bsc#1182283).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).
- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).
- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).
Patchnames
openSUSE-2021-393
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The openSUSE Linux Leap 15.2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).\n- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).\n- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).\n by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).\n- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially \n enable an escalation of privilege via local access (bsc#1181720).\n- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially \n enable a denial of service via local access (bsc#1181735).\n- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially \n enable a denial of service via local access (bsc#1181736 ).\n- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user \n to potentially enable a denial of service via local access (bsc#1181738).\n- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access \n because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Fix exception code class checks (git-fixes).\n- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).\n- ACPI: property: Fix fwnode string properties matching (git-fixes).\n- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).\n- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).\n- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).\n- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).\n- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).\n- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).\n- ALSA: pcm: Call sync_stop at disconnection (git-fixes).\n- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).\n- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).\n- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).\n- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).\n- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).\n- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).\n- ALSA: usb-audio: More strict state change in EP (git-fixes).\n- amba: Fix resource leak for drivers without .remove (git-fixes).\n- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)\n- armv7hl: lpae: Update config files. Disable KVM support (bsc#1182697)\n- ASoC: cpcap: fix microphone timeslot mask (git-fixes).\n- ASoC: cs42l56: fix up error handling in probe (git-fixes).\n- ASoC: simple-card-utils: Fix device module clock (git-fixes).\n- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).\n- ata: ahci_brcm: Add back regulators management (git-fixes).\n- ata: sata_nv: Fix retrieving of active qcs (git-fixes).\n- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).\n- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).\n- bcache: fix overflow in offset_to_stripe() (git-fixes).\n- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).\n- blk-mq: insert request not through ->queue_rq into sw/scheduler queue (bsc#1182443).\n- blk-mq: move cancel of hctx->run_work to the front of blk_exit_queue (bsc#1182444).\n- block: fix inflight statistics of part0 (bsc#1182445).\n- block: respect queue limit of max discard segment (bsc#1182441).\n- block: virtio_blk: fix handling single range discard request (bsc#1182439).\n- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).\n- Bluetooth: drop HCI device reference before return (git-fixes).\n- Bluetooth: Fix initializing response id after clearing struct (git-fixes).\n- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).\n- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).\n- bnxt_en: Fix accumulation of bp->net_stats_prev (git-fixes).\n- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).\n- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).\n- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).\n- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).\n- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).\n- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).\n- bonding: set dev->needed_headroom in bond_setup_by_slave() (git-fixes).\n- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).\n- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).\n- bpf, cgroup: Fix problematic bounds check (bsc#1155518).\n- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).\n- btrfs: Cleanup try_flush_qgroup (bsc#1182047).\n- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).\n- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).\n- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).\n- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).\n- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).\n- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).\n- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).\n- caif: no need to check return value of debugfs_create functions (git-fixes).\n- ceph: fix flush_snap logic after putting caps (bsc#1182854).\n- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).\n- cgroup: fix psi monitor for root cgroup (bsc#1182686).\n- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).\n- chelsio/chtls: correct function return and return type (git-fixes).\n- chelsio/chtls: correct netdevice for vlan interface (git-fixes).\n- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).\n- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).\n- chelsio/chtls: fix deadlock issue (git-fixes).\n- chelsio/chtls: fix memory leaks caused by a race (git-fixes).\n- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).\n- chelsio/chtls: fix panic during unload reload chtls (git-fixes).\n- chelsio/chtls: fix socket lock (git-fixes).\n- chelsio/chtls: fix tls record info to user (git-fixes).\n- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).\n- chtls: Added a check to avoid NULL pointer dereference (git-fixes).\n- chtls: Fix chtls resources release sequence (git-fixes).\n- chtls: Fix hardware tid leak (git-fixes).\n- chtls: Fix panic when route to peer not configured (git-fixes).\n- chtls: Remove invalid set_tcb call (git-fixes).\n- chtls: Replace skb_dequeue with skb_peek (git-fixes).\n- cifs: check all path components in resolved dfs target (bsc#1181710).\n- cifs: fix nodfs mount option (bsc#1181710).\n- cifs: introduce helper for finding referral server (bsc#1181710).\n- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).\n- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).\n- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).\n- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).\n- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).\n- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).\n- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).\n- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).\n- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).\n- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).\n- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in ->remove() (git-fixes).\n- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).\n- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).\n- crypto: ecdh_helper - Ensure 'len >= secret.len' in decode_key() (git-fixes).\n- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).\n- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).\n- cxgb4: fix all-mask IP address comparison (git-fixes).\n- cxgb4: fix checks for max queues to allocate (git-fixes).\n- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).\n- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).\n- cxgb4: fix SGE queue dump destination buffer context (git-fixes).\n- cxgb4: fix the panic caused by non smac rewrite (git-fixes).\n- cxgb4: move DCB version extern to header file (git-fixes).\n- cxgb4: move handling L2T ARP failures to caller (git-fixes).\n- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).\n- cxgb4: parse TC-U32 key values and masks natively (git-fixes).\n- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).\n- cxgb4: set up filter action after rewrites (git-fixes).\n- cxgb4: use correct type for all-mask IP address comparison (git-fixes).\n- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).\n- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).\n- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).\n- dmaengine: hsu: disable spurious interrupt (git-fixes).\n- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).\n- dm crypt: avoid truncating the logical block size (git-fixes).\n- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).\n- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).\n- dm thin metadata: Avoid returning cmd->bm wild pointer on error (bsc#1177529).\n- dm thin metadata: fix lockdep complaint (bsc#1177529).\n- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).\n- dm: use noio when sending kobject event (bsc#1177529).\n- docs: filesystems: vfs: correct flag name (bsc#1182856).\n- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).\n- Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).\n- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).\n- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).\n- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).\n- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).\n- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).\n- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).\n- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).\n- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).\n- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).\n- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).\n- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).\n- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).\n- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).\n- drm/meson: Unbind all connectors on module removal (bsc#1152472)\n- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)\n- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)\n- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)\n- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)\n- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)\n- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).\n- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).\n- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).\n- ext4: fix a memory leak of ext4_free_data (bsc#1182447).\n- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).\n- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).\n- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).\n- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).\n- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).\n- firmware_loader: align .builtin_fw to 8 (git-fixes).\n- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).\n- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).\n- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).\n- gma500: clean up error handling in init (git-fixes).\n- gpio: pcf857x: Fix missing first interrupt (git-fixes).\n- HID: core: detect and skip invalid inputs to snto32() (git-fixes).\n- HID: make arrays usage and value to be the same (git-fixes).\n- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).\n- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).\n- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).\n- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).\n- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).\n- i2c: stm32f7: fix configuration of the digital filter (git-fixes).\n- i3c: master: dw: Drop redundant disec call (git-fixes).\n- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).\n- i40e: avoid premature Rx buffer reuse (git-fixes).\n- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).\n- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).\n- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).\n- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).\n- iavf: fix double-release of rtnl_lock (git-fixes).\n- iavf: fix error return code in iavf_init_get_resources() (git-fixes).\n- iavf: fix speed reporting over virtchnl (git-fixes).\n- iavf: Fix updating statistics (git-fixes).\n- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).\n- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).\n- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).\n- ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: device remove has higher precedence over reset (bsc#1065729).\n- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).\n- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).\n- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).\n- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).\n- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: serialize access to work queue on remove (bsc#1065729).\n- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).\n- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).\n- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).\n- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).\n- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).\n- igc: fix link speed advertising (git-fixes).\n- igc: Fix returning wrong statistics (git-fixes).\n- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).\n- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).\n- include/linux/memremap.h: remove stale comments (git-fixes).\n- Input: elo - fix an error code in elo_connect() (git-fixes).\n- Input: i8042 - unbreak Pegatron C15B (git-fixes).\n- Input: joydev - prevent potential read overflow in ioctl (git-fixes).\n- Input: sur40 - fix an error code in sur40_probe() (git-fixes).\n- Input: xpad - sync supported devices with fork on GitHub (git-fixes).\n- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).\n- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).\n- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).\n- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).\n- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).\n- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).\n- iwlwifi: pcie: fix context info memory leak (git-fixes).\n- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).\n- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).\n- ixgbe: avoid premature Rx buffer reuse (git-fixes).\n- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).\n- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).\n- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.\n- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: add more data to CSD lock debugging (bsc#1180846).\n- kernel/smp: prepare more CSD lock debugging (bsc#1180846).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).\n- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).\n- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).\n- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).\n- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).\n- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).\n- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).\n- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).\n- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).\n- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).\n- KVM: x86: clear stale x86_emulate_ctxt->intercept value (bsc#1182381).\n- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).\n- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).\n- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).\n- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).\n- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).\n- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).\n- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).\n- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).\n- mac80211: fix fast-rx encryption check (git-fixes).\n- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).\n- mac80211: pause TX while changing interface type (git-fixes).\n- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.\n- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- matroxfb: avoid -Warray-bounds warning (bsc#1152472)\n- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).\n- media: camss: missing error code in msm_video_register() (git-fixes).\n- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).\n- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).\n- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).\n- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).\n- media: lmedm04: Fix misuse of comma (git-fixes).\n- media: media/pci: Fix memleak in empress_init (git-fixes).\n- media: mt9v111: Remove unneeded device-managed puts (git-fixes).\n- media: pwc: Use correct device for DMA (bsc#1181133).\n- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).\n- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).\n- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).\n- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).\n- media: vsp1: Fix an error handling path in the probe function (git-fixes).\n- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).\n- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).\n- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).\n- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).\n- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).\n- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).\n- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).\n- mlxsw: core: Fix memory leak on module removal (git-fixes).\n- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).\n- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).\n- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).\n- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).\n- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).\n- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).\n- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).\n- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).\n- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).\n- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).\n- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).\n- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).\n- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).\n- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).\n- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).\n- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).\n- net: axienet: Fix error return code in axienet_probe() (git-fixes).\n- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).\n- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).\n- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).\n- net: bcmgenet: set Rx mode before starting netif (git-fixes).\n- net: bcmgenet: use hardware padding of runt frames (git-fixes).\n- net: broadcom CNIC: requires MMU (git-fixes).\n- net: caif: Fix debugfs on 64-bit platforms (git-fixes).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).\n- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).\n- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).\n- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).\n- net: ethernet: ave: Fix error returns in ave_init (git-fixes).\n- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).\n- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).\n- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).\n- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).\n- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).\n- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).\n- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).\n- net: gro: do not keep too many GRO packets in napi->rx_list (bsc#1154353).\n- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).\n- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).\n- net: hns3: add reset check for VF updating port based VLAN (git-fixes).\n- net: hns3: clear port base VLAN when unload PF (git-fixes).\n- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).\n- net: hns3: fix a TX timeout issue (git-fixes).\n- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).\n- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).\n- net: hns3: fix for VLAN config when reset failed (git-fixes).\n- net: hns3: fix RSS config lost after VF reset (git-fixes).\n- net: hns3: fix set and get link ksettings issue (git-fixes).\n- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).\n- net: hns3: fix the number of queues actually used by ARQ (git-fixes).\n- net: hns3: fix use-after-free when doing self test (git-fixes).\n- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).\n- net: hns: fix return value check in __lb_other_process() (git-fixes).\n- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).\n- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).\n- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).\n- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix init_hca fields offset (git-fixes).\n- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).\n- net/mlx4_en: Handle TX error CQE (bsc#1181854).\n- net/mlx5: Add handling of port type in rule deletion (git-fixes).\n- net/mlx5: Annotate mutex destroy for root ns (git-fixes).\n- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).\n- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).\n- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).\n- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).\n- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).\n- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).\n- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).\n- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).\n- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).\n- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).\n- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).\n- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).\n- net/mlx5e: Fix error path of device attach (git-fixes).\n- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).\n- net/mlx5e: Fix two double free cases (git-fixes).\n- net/mlx5e: Fix VLAN cleanup flow (git-fixes).\n- net/mlx5e: Fix VLAN create flow (git-fixes).\n- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).\n- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).\n- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).\n- net/mlx5e: Reduce tc unsupported key print level (git-fixes).\n- net/mlx5e: Rename hw_modify to preactivate (git-fixes).\n- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).\n- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).\n- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).\n- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).\n- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).\n- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).\n- net/mlx5: Fix deletion of duplicate rules (git-fixes).\n- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).\n- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).\n- net/mlx5: Fix request_irqs error flow (git-fixes).\n- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).\n- net/mlx5: Query PPS pin operational status before registering it (git-fixes).\n- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).\n- net: moxa: Fix a potential double 'free_irq()' (git-fixes).\n- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).\n- net: mscc: ocelot: fix address ageing time (again) (git-fixes).\n- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).\n- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).\n- net: mvpp2: disable force link UP during port init procedure (git-fixes).\n- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).\n- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).\n- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).\n- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).\n- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).\n- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).\n- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).\n- net: octeon: mgmt: Repair filling of RX ring (git-fixes).\n- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).\n- net: phy: extract link partner advertisement reading (git-fixes).\n- net: phy: extract pause mode (git-fixes).\n- net: phy: marvell10g: fix null pointer dereference (git-fixes).\n- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).\n- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).\n- net: qca_spi: fix receive buffer size check (git-fixes).\n- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).\n- net: qede: fix PTP initialization on recovery (git-fixes).\n- net: qede: fix use-after-free on recovery and AER handling (git-fixes).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix async event callbacks unregistering (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix 'maybe uninitialized' warning (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qed: RDMA personality shouldn't fail VF load (git-fixes).\n- net: re-solve some conflicts after net -> net-next merge (bsc#1176855 ltc#187293).\n- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).\n- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).\n- net: rmnet: fix bridge mode bugs (git-fixes).\n- net: rmnet: fix lower interface leak (git-fixes).\n- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).\n- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).\n- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).\n- net: rmnet: fix suspicious RCU usage (git-fixes).\n- net: rmnet: print error message when command fails (git-fixes).\n- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).\n- net: rmnet: use upper/lower device infrastructure (git-fixes).\n- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).\n- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).\n- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).\n- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).\n- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).\n- net: stmmac: Do not accept invalid MTU values (git-fixes).\n- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).\n- net: stmmac: Enable 16KB buffer size (git-fixes).\n- net: stmmac: fix disabling flexible PPS output (git-fixes).\n- net: stmmac: fix length of PTP clock's name string (git-fixes).\n- net: stmmac: Fix the TX IOC in xmit path (git-fixes).\n- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).\n- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).\n- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).\n- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).\n- net: sun: fix missing release regions in cas_init_one() (git-fixes).\n- net: team: fix memory leak in __team_options_register (git-fixes).\n- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).\n- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).\n- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).\n- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).\n- nvme-multipath: Early exit if no path is available (bsc#1180964).\n- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).\n- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).\n- objtool: Do not fail on missing symbol table (bsc#1169514).\n- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).\n- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).\n- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).\n- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).\n- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).\n- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).\n- perf/x86/intel/uncore: With > 8 nodes, get pci bus die id from NUMA info (bsc#1180989).\n- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).\n- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).\n- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).\n- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).\n- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).\n- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).\n- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).\n- powerpc: Fix alignment bug within the init sections (bsc#1065729).\n- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).\n- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).\n- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).\n- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).\n- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).\n- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).\n- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).\n- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).\n- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).\n- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).\n- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).\n- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).\n- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).\n- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).\n- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).\n- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).\n- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).\n- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).\n- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).\n- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).\n- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).\n- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).\n- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).\n- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).\n- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).\n- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).\n- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).\n- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).\n- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).\n- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).\n- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).\n- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).\n- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).\n- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).\n- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).\n- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).\n- powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).\n- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).\n- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).\n- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).\n- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).\n- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).\n- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).\n- qed: select CONFIG_CRC32 (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).\n- quota: Sanity-check quota file headers on load (bsc#1182461).\n- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).\n- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).\n- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)\n- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)\n- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)\n- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).\n- RDMA/efa: Count admin commands errors (bsc#1176248).\n- RDMA/efa: Count mmap failures (bsc#1176248).\n- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).\n- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).\n- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).\n- RDMA/efa: Expose minimum SQ size (bsc#1176248).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).\n- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).\n- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).\n- RDMA/efa: Report create CQ error counter (bsc#1176248).\n- RDMA/efa: Report host information to the device (bsc#1176248).\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).\n- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).\n- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).\n- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).\n- regulator: axp20x: Fix reference cout leak (git-fixes).\n- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).\n- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).\n- regulator: Fix lockdep warning resolving supplies (git-fixes).\n- regulator: s5m8767: Drop regulators OF node reference (git-fixes).\n- regulator: s5m8767: Fix reference count leak (git-fixes).\n- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).\n- Remove debug patch for boot failure (bsc#1182602 ltc#190924). \n- reset: hisilicon: correct vendor prefix (git-fixes).\n- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).\n- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).\n- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).\n- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).\n- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)\n- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)\n- rtc: s5m: select REGMAP_I2C (git-fixes).\n- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).\n- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).\n- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).\n- sched: Reenable interrupts in do_sched_yield() (git-fixes)\n- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).\n- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).\n- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).\n- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).\n- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).\n- smsc95xx: check return value of smsc95xx_reset (git-fixes).\n- soc: aspeed: snoop: Add clock control logic (git-fixes).\n- spi: atmel: Put allocated master before return (git-fixes).\n- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).\n- spi: spi-synquacer: fix set_cs handling (git-fixes).\n- spi: stm32: properly handle 0 byte transfer (git-fixes).\n- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).\n- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).\n- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).\n- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).\n- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).\n- team: set dev->needed_headroom in team_setup_by_port() (git-fixes).\n- tpm: Remove tpm_dev_wq_lock (git-fixes).\n- tpm_tis: Clean up locality release (git-fixes).\n- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).\n- tracing: Check length before giving out the filter buffer (git-fixes).\n- tracing: Do not count ftrace events in top level enable output (git-fixes).\n- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).\n- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).\n- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).\n- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).\n- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).\n- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).\n- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).\n- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455). \n- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).\n- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).\n- Update config files: armv7hl: Set ledtrig-default-on as builtin (bsc#1182128)\n- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)\n- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).\n- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).\n- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).\n- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).\n- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).\n- USB: gadget: u_audio: Free requests only after callback (git-fixes).\n- USB: musb: Fix runtime PM race in musb_queue_resume_work (git-fixes).\n- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).\n- USB: quirks: sort quirk entries (git-fixes).\n- USB: renesas_usbhs: Clear pipe running flag in usbhs_pkt_pop() (git-fixes).\n- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).\n- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).\n- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).\n- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).\n- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).\n- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).\n- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).\n- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).\n- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).\n- virtio_net: Fix error code in probe() (git-fixes).\n- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).\n- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).\n- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).\n- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).\n- vxlan: fix memleak of fdb (git-fixes).\n- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).\n- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).\n- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).\n- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).\n- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).\n- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).\n- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).\n- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).\n- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).\n- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).\n- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).\n- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).\n- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).\n- xfs: ratelimit xfs_discard_page messages (bsc#1182283).\n- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).\n- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).\n- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).\n- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).\n- xhci: fix bounce buffer usage for non-sg list case (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-393", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0393-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:0393-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:0393-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1078720", url: "https://bugzilla.suse.com/1078720", }, { category: "self", summary: "SUSE Bug 1081134", url: "https://bugzilla.suse.com/1081134", }, { category: "self", summary: "SUSE Bug 1084610", url: "https://bugzilla.suse.com/1084610", }, { category: "self", summary: "SUSE Bug 1132477", url: "https://bugzilla.suse.com/1132477", }, { category: "self", summary: "SUSE Bug 1151927", url: "https://bugzilla.suse.com/1151927", }, { category: "self", summary: "SUSE Bug 1152472", url: "https://bugzilla.suse.com/1152472", }, { category: "self", summary: "SUSE Bug 1152489", url: "https://bugzilla.suse.com/1152489", }, { category: "self", summary: "SUSE Bug 1154353", url: "https://bugzilla.suse.com/1154353", }, { category: "self", summary: "SUSE Bug 1155518", url: "https://bugzilla.suse.com/1155518", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1163776", url: "https://bugzilla.suse.com/1163776", }, { category: "self", summary: "SUSE Bug 1169514", url: "https://bugzilla.suse.com/1169514", }, { category: "self", summary: "SUSE Bug 1170442", url: "https://bugzilla.suse.com/1170442", }, { category: "self", summary: "SUSE Bug 1176248", url: "https://bugzilla.suse.com/1176248", }, { category: "self", summary: "SUSE Bug 1176855", url: "https://bugzilla.suse.com/1176855", }, { category: "self", summary: "SUSE Bug 1177109", url: "https://bugzilla.suse.com/1177109", }, { category: "self", summary: "SUSE Bug 1177326", url: "https://bugzilla.suse.com/1177326", }, { category: "self", summary: "SUSE Bug 1177440", url: "https://bugzilla.suse.com/1177440", }, { category: "self", summary: "SUSE Bug 1177529", url: "https://bugzilla.suse.com/1177529", }, { category: "self", summary: "SUSE Bug 1178142", url: "https://bugzilla.suse.com/1178142", }, { category: "self", summary: "SUSE Bug 1178995", url: "https://bugzilla.suse.com/1178995", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179137", url: "https://bugzilla.suse.com/1179137", }, { category: "self", summary: "SUSE Bug 1179243", url: "https://bugzilla.suse.com/1179243", }, { category: "self", summary: "SUSE Bug 1179428", url: "https://bugzilla.suse.com/1179428", }, { category: "self", summary: "SUSE Bug 1179660", url: "https://bugzilla.suse.com/1179660", }, { category: "self", summary: "SUSE Bug 1179929", url: "https://bugzilla.suse.com/1179929", }, { category: "self", summary: "SUSE Bug 1180058", url: "https://bugzilla.suse.com/1180058", }, { category: "self", summary: "SUSE Bug 1180846", url: "https://bugzilla.suse.com/1180846", }, { category: "self", summary: "SUSE Bug 1180964", url: "https://bugzilla.suse.com/1180964", }, { category: "self", summary: "SUSE Bug 1180989", url: "https://bugzilla.suse.com/1180989", }, { category: "self", summary: "SUSE Bug 1181133", url: "https://bugzilla.suse.com/1181133", }, { category: "self", summary: "SUSE Bug 1181259", url: "https://bugzilla.suse.com/1181259", }, { category: "self", summary: "SUSE Bug 1181544", url: "https://bugzilla.suse.com/1181544", }, { category: "self", summary: "SUSE Bug 1181574", url: "https://bugzilla.suse.com/1181574", }, { category: "self", summary: "SUSE Bug 1181637", url: "https://bugzilla.suse.com/1181637", }, { category: "self", summary: "SUSE Bug 1181655", url: "https://bugzilla.suse.com/1181655", }, { category: "self", summary: "SUSE Bug 1181671", url: "https://bugzilla.suse.com/1181671", }, { category: "self", summary: "SUSE Bug 1181674", url: "https://bugzilla.suse.com/1181674", }, { category: "self", summary: "SUSE Bug 1181710", url: "https://bugzilla.suse.com/1181710", }, { category: "self", summary: "SUSE Bug 1181720", url: "https://bugzilla.suse.com/1181720", }, { category: "self", summary: "SUSE Bug 1181735", url: "https://bugzilla.suse.com/1181735", }, { category: "self", summary: "SUSE Bug 1181736", url: "https://bugzilla.suse.com/1181736", }, { category: "self", summary: "SUSE Bug 1181738", url: "https://bugzilla.suse.com/1181738", }, { category: "self", summary: "SUSE Bug 1181747", url: "https://bugzilla.suse.com/1181747", }, { category: "self", summary: "SUSE Bug 1181753", url: "https://bugzilla.suse.com/1181753", }, { category: "self", summary: "SUSE Bug 1181818", url: "https://bugzilla.suse.com/1181818", }, { category: "self", summary: "SUSE Bug 1181843", url: "https://bugzilla.suse.com/1181843", }, { category: "self", summary: "SUSE Bug 1181854", url: "https://bugzilla.suse.com/1181854", }, { category: "self", summary: "SUSE Bug 1181896", url: "https://bugzilla.suse.com/1181896", }, { category: "self", summary: "SUSE Bug 1181958", url: "https://bugzilla.suse.com/1181958", }, { category: "self", summary: "SUSE Bug 1181960", url: "https://bugzilla.suse.com/1181960", }, { category: "self", summary: "SUSE Bug 1181985", url: "https://bugzilla.suse.com/1181985", }, { category: "self", summary: "SUSE Bug 1182047", url: "https://bugzilla.suse.com/1182047", }, { category: "self", summary: "SUSE Bug 1182118", url: "https://bugzilla.suse.com/1182118", }, { category: "self", summary: "SUSE Bug 1182128", url: "https://bugzilla.suse.com/1182128", }, { category: "self", summary: "SUSE Bug 1182140", url: "https://bugzilla.suse.com/1182140", }, { category: "self", summary: "SUSE Bug 1182171", url: "https://bugzilla.suse.com/1182171", }, { category: "self", summary: "SUSE Bug 1182175", url: "https://bugzilla.suse.com/1182175", }, { category: "self", summary: "SUSE Bug 1182259", url: "https://bugzilla.suse.com/1182259", }, { category: "self", summary: "SUSE Bug 1182265", url: "https://bugzilla.suse.com/1182265", }, { category: "self", summary: "SUSE Bug 1182266", url: "https://bugzilla.suse.com/1182266", }, { category: "self", summary: "SUSE Bug 1182267", url: "https://bugzilla.suse.com/1182267", }, { category: "self", summary: "SUSE Bug 1182268", url: "https://bugzilla.suse.com/1182268", }, { category: "self", summary: "SUSE Bug 1182271", url: "https://bugzilla.suse.com/1182271", }, { category: "self", summary: "SUSE Bug 1182272", url: "https://bugzilla.suse.com/1182272", }, { category: "self", summary: "SUSE Bug 1182273", url: "https://bugzilla.suse.com/1182273", }, { category: "self", summary: "SUSE Bug 1182275", url: "https://bugzilla.suse.com/1182275", }, { category: "self", summary: "SUSE Bug 1182276", url: "https://bugzilla.suse.com/1182276", }, { category: "self", summary: "SUSE Bug 1182278", url: "https://bugzilla.suse.com/1182278", }, { category: "self", summary: "SUSE Bug 1182283", url: "https://bugzilla.suse.com/1182283", }, { category: "self", summary: "SUSE Bug 1182374", url: "https://bugzilla.suse.com/1182374", }, { category: "self", summary: "SUSE Bug 1182380", url: "https://bugzilla.suse.com/1182380", }, { category: "self", summary: "SUSE Bug 1182381", url: "https://bugzilla.suse.com/1182381", }, { category: "self", summary: "SUSE Bug 1182406", url: "https://bugzilla.suse.com/1182406", }, { category: "self", summary: "SUSE Bug 1182430", url: "https://bugzilla.suse.com/1182430", }, { category: "self", summary: "SUSE Bug 1182439", url: "https://bugzilla.suse.com/1182439", }, { category: "self", summary: "SUSE Bug 1182441", url: "https://bugzilla.suse.com/1182441", }, { category: "self", summary: "SUSE Bug 1182442", url: "https://bugzilla.suse.com/1182442", }, { category: "self", summary: "SUSE Bug 1182443", url: "https://bugzilla.suse.com/1182443", }, { category: "self", summary: "SUSE Bug 1182444", url: "https://bugzilla.suse.com/1182444", }, { category: "self", summary: "SUSE Bug 1182445", url: "https://bugzilla.suse.com/1182445", }, { category: "self", summary: "SUSE Bug 1182446", url: "https://bugzilla.suse.com/1182446", }, { category: "self", summary: "SUSE Bug 1182447", url: "https://bugzilla.suse.com/1182447", }, { category: "self", summary: "SUSE Bug 1182449", url: "https://bugzilla.suse.com/1182449", }, { category: "self", summary: "SUSE Bug 1182454", url: "https://bugzilla.suse.com/1182454", }, { category: "self", summary: "SUSE Bug 1182455", url: "https://bugzilla.suse.com/1182455", }, { category: "self", summary: "SUSE Bug 1182456", url: "https://bugzilla.suse.com/1182456", }, { category: "self", summary: "SUSE Bug 1182457", url: "https://bugzilla.suse.com/1182457", }, { category: "self", summary: "SUSE Bug 1182458", url: "https://bugzilla.suse.com/1182458", }, { category: "self", summary: "SUSE Bug 1182459", url: "https://bugzilla.suse.com/1182459", }, { category: "self", summary: "SUSE Bug 1182460", url: "https://bugzilla.suse.com/1182460", }, { category: "self", summary: "SUSE Bug 1182461", url: "https://bugzilla.suse.com/1182461", }, { category: "self", summary: "SUSE Bug 1182462", url: "https://bugzilla.suse.com/1182462", }, { category: "self", summary: "SUSE Bug 1182463", url: "https://bugzilla.suse.com/1182463", }, { category: "self", summary: "SUSE Bug 1182464", url: "https://bugzilla.suse.com/1182464", }, { category: "self", summary: "SUSE Bug 1182465", url: "https://bugzilla.suse.com/1182465", }, { category: "self", summary: "SUSE Bug 1182466", url: "https://bugzilla.suse.com/1182466", }, { category: "self", summary: "SUSE Bug 1182485", url: "https://bugzilla.suse.com/1182485", }, { category: "self", summary: "SUSE Bug 1182489", url: "https://bugzilla.suse.com/1182489", }, { category: "self", summary: "SUSE Bug 1182490", url: "https://bugzilla.suse.com/1182490", }, { category: "self", summary: "SUSE Bug 1182547", url: "https://bugzilla.suse.com/1182547", }, { category: "self", summary: "SUSE Bug 1182558", url: "https://bugzilla.suse.com/1182558", }, { category: "self", summary: "SUSE Bug 1182560", url: "https://bugzilla.suse.com/1182560", }, { category: "self", summary: "SUSE Bug 1182561", url: "https://bugzilla.suse.com/1182561", }, { category: "self", summary: "SUSE Bug 1182571", url: "https://bugzilla.suse.com/1182571", }, { category: "self", summary: "SUSE Bug 1182599", url: "https://bugzilla.suse.com/1182599", }, { category: "self", summary: "SUSE Bug 1182602", url: "https://bugzilla.suse.com/1182602", }, { category: "self", summary: "SUSE Bug 1182626", url: "https://bugzilla.suse.com/1182626", }, { category: "self", summary: "SUSE Bug 1182650", url: "https://bugzilla.suse.com/1182650", }, { category: "self", summary: "SUSE Bug 1182672", url: "https://bugzilla.suse.com/1182672", }, { category: "self", summary: "SUSE Bug 1182676", url: "https://bugzilla.suse.com/1182676", }, { category: "self", summary: "SUSE Bug 1182683", url: "https://bugzilla.suse.com/1182683", }, { category: "self", summary: "SUSE Bug 1182684", url: "https://bugzilla.suse.com/1182684", }, { category: "self", summary: "SUSE Bug 1182686", url: "https://bugzilla.suse.com/1182686", }, { category: "self", summary: "SUSE Bug 1182697", url: "https://bugzilla.suse.com/1182697", }, { category: "self", summary: "SUSE Bug 1182770", url: "https://bugzilla.suse.com/1182770", }, { category: "self", summary: "SUSE Bug 1182798", url: "https://bugzilla.suse.com/1182798", }, { category: "self", summary: "SUSE Bug 1182800", url: "https://bugzilla.suse.com/1182800", }, { category: "self", summary: "SUSE Bug 1182801", url: "https://bugzilla.suse.com/1182801", }, { category: "self", summary: "SUSE Bug 1182854", url: "https://bugzilla.suse.com/1182854", }, { category: "self", summary: "SUSE Bug 1182856", url: "https://bugzilla.suse.com/1182856", }, { category: "self", summary: "SUSE CVE CVE-2020-12362 page", url: "https://www.suse.com/security/cve/CVE-2020-12362/", }, { category: "self", summary: "SUSE CVE CVE-2020-12363 page", url: "https://www.suse.com/security/cve/CVE-2020-12363/", }, { category: "self", summary: "SUSE CVE CVE-2020-12364 page", url: "https://www.suse.com/security/cve/CVE-2020-12364/", }, { category: "self", summary: "SUSE CVE CVE-2020-12373 page", url: "https://www.suse.com/security/cve/CVE-2020-12373/", }, { category: "self", summary: "SUSE CVE CVE-2020-29368 page", url: "https://www.suse.com/security/cve/CVE-2020-29368/", }, { category: "self", summary: "SUSE CVE CVE-2020-29374 page", url: "https://www.suse.com/security/cve/CVE-2020-29374/", }, { category: "self", summary: "SUSE CVE CVE-2021-26930 page", url: "https://www.suse.com/security/cve/CVE-2021-26930/", }, { category: "self", summary: "SUSE CVE CVE-2021-26931 page", url: "https://www.suse.com/security/cve/CVE-2021-26931/", }, { category: "self", summary: "SUSE CVE CVE-2021-26932 page", url: "https://www.suse.com/security/cve/CVE-2021-26932/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-03-08T07:14:45Z", generator: { date: "2021-03-08T07:14:45Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:0393-1", initial_release_date: "2021-03-08T07:14:45Z", revision_history: [ { date: "2021-03-08T07:14:45Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-lp152.66.2.noarch", product: { name: "kernel-devel-5.3.18-lp152.66.2.noarch", product_id: "kernel-devel-5.3.18-lp152.66.2.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-lp152.66.2.noarch", product: { name: "kernel-docs-5.3.18-lp152.66.2.noarch", product_id: "kernel-docs-5.3.18-lp152.66.2.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-lp152.66.2.noarch", product: { name: "kernel-docs-html-5.3.18-lp152.66.2.noarch", product_id: "kernel-docs-html-5.3.18-lp152.66.2.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-lp152.66.2.noarch", product: { name: "kernel-macros-5.3.18-lp152.66.2.noarch", product_id: "kernel-macros-5.3.18-lp152.66.2.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-lp152.66.2.noarch", product: { name: "kernel-source-5.3.18-lp152.66.2.noarch", product_id: "kernel-source-5.3.18-lp152.66.2.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-lp152.66.2.noarch", product: { name: "kernel-source-vanilla-5.3.18-lp152.66.2.noarch", product_id: "kernel-source-vanilla-5.3.18-lp152.66.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-debug-5.3.18-lp152.66.2.x86_64", product: { name: "kernel-debug-5.3.18-lp152.66.2.x86_64", product_id: "kernel-debug-5.3.18-lp152.66.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-lp152.66.2.x86_64", product: { name: "kernel-debug-devel-5.3.18-lp152.66.2.x86_64", product_id: "kernel-debug-devel-5.3.18-lp152.66.2.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-lp152.66.2.x86_64", product: { name: "kernel-default-5.3.18-lp152.66.2.x86_64", product_id: "kernel-default-5.3.18-lp152.66.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", product: { name: "kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", product_id: "kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-lp152.66.2.x86_64", product: { name: "kernel-default-devel-5.3.18-lp152.66.2.x86_64", product_id: "kernel-default-devel-5.3.18-lp152.66.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", product: { name: "kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", product_id: "kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-lp152.66.2.x86_64", product: { name: "kernel-obs-build-5.3.18-lp152.66.2.x86_64", product_id: "kernel-obs-build-5.3.18-lp152.66.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-lp152.66.2.x86_64", product: { name: "kernel-obs-qa-5.3.18-lp152.66.2.x86_64", product_id: "kernel-obs-qa-5.3.18-lp152.66.2.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-lp152.66.2.x86_64", product: { name: "kernel-preempt-5.3.18-lp152.66.2.x86_64", product_id: "kernel-preempt-5.3.18-lp152.66.2.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", product: { name: "kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", product_id: "kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-lp152.66.2.x86_64", product: { name: "kernel-syms-5.3.18-lp152.66.2.x86_64", product_id: "kernel-syms-5.3.18-lp152.66.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-debug-5.3.18-lp152.66.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", }, product_reference: "kernel-debug-5.3.18-lp152.66.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.3.18-lp152.66.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", }, product_reference: "kernel-debug-devel-5.3.18-lp152.66.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-lp152.66.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", }, product_reference: "kernel-default-5.3.18-lp152.66.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", }, product_reference: "kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", }, product_reference: "kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-lp152.66.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", }, product_reference: "kernel-default-devel-5.3.18-lp152.66.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-lp152.66.2.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", }, product_reference: "kernel-devel-5.3.18-lp152.66.2.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-lp152.66.2.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", }, product_reference: "kernel-docs-5.3.18-lp152.66.2.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-5.3.18-lp152.66.2.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", }, product_reference: "kernel-docs-html-5.3.18-lp152.66.2.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.3.18-lp152.66.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", }, product_reference: "kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", }, product_reference: "kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-lp152.66.2.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", }, product_reference: "kernel-macros-5.3.18-lp152.66.2.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-lp152.66.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", }, product_reference: "kernel-obs-build-5.3.18-lp152.66.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-lp152.66.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", }, product_reference: "kernel-obs-qa-5.3.18-lp152.66.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-lp152.66.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", }, product_reference: "kernel-preempt-5.3.18-lp152.66.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-lp152.66.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-lp152.66.2.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", }, product_reference: "kernel-source-5.3.18-lp152.66.2.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.3.18-lp152.66.2.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", }, product_reference: "kernel-source-vanilla-5.3.18-lp152.66.2.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-lp152.66.2.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", }, product_reference: "kernel-syms-5.3.18-lp152.66.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2020-12362", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12362", }, ], notes: [ { category: "general", text: "Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12362", url: "https://www.suse.com/security/cve/CVE-2020-12362", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12362", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1182033 for CVE-2020-12362", url: "https://bugzilla.suse.com/1182033", }, { category: "external", summary: "SUSE Bug 1190859 for CVE-2020-12362", url: "https://bugzilla.suse.com/1190859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-08T07:14:45Z", details: "important", }, ], title: "CVE-2020-12362", }, { cve: "CVE-2020-12363", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12363", }, ], notes: [ { category: "general", text: "Improper input validation in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12363", url: "https://www.suse.com/security/cve/CVE-2020-12363", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12363", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1181735 for CVE-2020-12363", url: "https://bugzilla.suse.com/1181735", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-08T07:14:45Z", details: "low", }, ], title: "CVE-2020-12363", }, { cve: "CVE-2020-12364", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12364", }, ], notes: [ { category: "general", text: "Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12364", url: "https://www.suse.com/security/cve/CVE-2020-12364", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12364", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1181736 for CVE-2020-12364", url: "https://bugzilla.suse.com/1181736", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-08T07:14:45Z", details: "low", }, ], title: "CVE-2020-12364", }, { cve: "CVE-2020-12373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12373", }, ], notes: [ { category: "general", text: "Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12373", url: "https://www.suse.com/security/cve/CVE-2020-12373", }, { category: "external", summary: "SUSE Bug 1181720 for CVE-2020-12373", url: "https://bugzilla.suse.com/1181720", }, { category: "external", summary: "SUSE Bug 1181738 for CVE-2020-12373", url: "https://bugzilla.suse.com/1181738", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 1.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-08T07:14:45Z", details: "low", }, ], title: "CVE-2020-12373", }, { cve: "CVE-2020-29368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29368", }, ], notes: [ { category: "general", text: "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29368", url: "https://www.suse.com/security/cve/CVE-2020-29368", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179660", }, { category: "external", summary: "SUSE Bug 1179664 for CVE-2020-29368", url: "https://bugzilla.suse.com/1179664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-08T07:14:45Z", details: "moderate", }, ], title: "CVE-2020-29368", }, { cve: "CVE-2020-29374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29374", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29374", url: "https://www.suse.com/security/cve/CVE-2020-29374", }, { category: "external", summary: "SUSE Bug 1179428 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179428", }, { category: "external", summary: "SUSE Bug 1179660 for CVE-2020-29374", url: "https://bugzilla.suse.com/1179660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-08T07:14:45Z", details: "low", }, ], title: "CVE-2020-29374", }, { cve: "CVE-2021-26930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26930", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26930", url: "https://www.suse.com/security/cve/CVE-2021-26930", }, { category: "external", summary: "SUSE Bug 1181843 for CVE-2021-26930", url: "https://bugzilla.suse.com/1181843", }, { category: "external", summary: "SUSE Bug 1182294 for CVE-2021-26930", url: "https://bugzilla.suse.com/1182294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-08T07:14:45Z", details: "important", }, ], title: "CVE-2021-26930", }, { cve: "CVE-2021-26931", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26931", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26931", url: "https://www.suse.com/security/cve/CVE-2021-26931", }, { category: "external", summary: "SUSE Bug 1181753 for CVE-2021-26931", url: "https://bugzilla.suse.com/1181753", }, { category: "external", summary: "SUSE Bug 1183022 for CVE-2021-26931", url: "https://bugzilla.suse.com/1183022", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-08T07:14:45Z", details: "moderate", }, ], title: "CVE-2021-26931", }, { cve: "CVE-2021-26932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26932", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26932", url: "https://www.suse.com/security/cve/CVE-2021-26932", }, { category: "external", summary: "SUSE Bug 1181747 for CVE-2021-26932", url: "https://bugzilla.suse.com/1181747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.66.2.lp152.8.23.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.66.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.66.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.66.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-03-08T07:14:45Z", details: "moderate", }, ], title: "CVE-2021-26932", }, ], }
gsd-2020-29374
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.
Aliases
Aliases
{ GSD: { alias: "CVE-2020-29374", description: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", id: "GSD-2020-29374", references: [ "https://www.suse.com/security/cve/CVE-2020-29374.html", "https://www.debian.org/security/2022/dsa-5096", "https://ubuntu.com/security/CVE-2020-29374", "https://alas.aws.amazon.com/cve/html/CVE-2020-29374.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2020-29374", ], details: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", id: "GSD-2020-29374", modified: "2023-12-13T01:22:11.770535Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-29374", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugs.chromium.org/p/project-zero/issues/detail?id=2045", refsource: "MISC", url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=2045", }, { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3", refsource: "MISC", url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3", }, { name: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f", refsource: "MISC", url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f", }, { name: "https://security.netapp.com/advisory/ntap-20210115-0002/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20210115-0002/", }, { name: "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, { name: "DSA-5096", refsource: "DEBIAN", url: "https://www.debian.org/security/2022/dsa-5096", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.7.3", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:solidfire_\\&_hci_storage_node:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-29374", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-362", }, { lang: "en", value: "CWE-863", }, ], }, ], }, references: { reference_data: [ { name: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3", refsource: "MISC", tags: [ "Release Notes", "Third Party Advisory", "Vendor Advisory", ], url: "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3", }, { name: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f", refsource: "MISC", tags: [ "Patch", "Vendor Advisory", ], url: "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f", }, { name: "https://bugs.chromium.org/p/project-zero/issues/detail?id=2045", refsource: "MISC", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=2045", }, { name: "https://security.netapp.com/advisory/ntap-20210115-0002/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20210115-0002/", }, { name: "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", refsource: "MISC", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "DSA-5096", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5096", }, { name: "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 3.3, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1, impactScore: 2.5, }, }, lastModifiedDate: "2023-11-09T14:44Z", publishedDate: "2020-11-28T07:15Z", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.